Double-Take Availability User's Guide
Double-Take Availability User's Guide
User's Guide
Double-Take, Balance, Double-Take Availability, Double-Take Backup, Double-Take Cargo, Double-Take Flex, Double-Take for
Hyper-V, Double-Take for Linux, Double-Take Move, Double-Take ShadowCaster, Double-Take for Virtual Systems, GeoCluster,
Livewire, netBoot/i, NSI, sanFly, TimeData, TimeSpring, winBoot/i and associated logos are registered trademarks or trademarks of
Double-Take Software, Inc. and/or its affiliates and subsidiaries in the United States and/or other countries. Microsoft, Hyper-V,
Windows, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other
countries. All other trademarks are the property of their respective companies.
DTA-521-UG
3/22/2010
Table of Contents
Double-Take Availability overview 14
Core operations 15
Mirroring 16
Replication 17
Failure monitoring and failover 18
Restoration 19
Double-Take Availability workloads 20
Full-server workloads 21
Application workloads 22
Virtual workloads 23
Cluster workloads 24
Supported configurations 26
One-to-one, active/standby 27
One-to-one, active/active 28
Many-to-one 29
One-to-many 30
Chained 31
Double-Take Availability requirements 32
General source and target server requirements 33
Foundation Edition 36
Standard Edition 37
Advanced Edition 38
Premium Edition 39
Virtual Guest 5-Pack Edition 40
Virtual Host Standard Edition 41
Virtual Host Advanced Edition 42
Virtual Host Premium Edition 43
Full-server workload requirements 44
Application workload requirements 45
Exchange protection requirements 46
SQL protection requirements 50
SharePoint protection requirements 52
BlackBerry protection requirements 53
File Server protection requirements 54
Virtual workload requirements 55
Physical or virtual to Hyper-V requirements 56
Physical or virtual to ESX requirements 57
Hyper-V to Hyper-V requirements 59
ESX to ESX requirements 60
Cluster workload requirements 61
Double-Take Console requirements 62
Installation 63
Installation and upgrade notes 64
Installing or upgrading Double-Take Availability 66
Installing or upgrading Double-Take for VMware Infrastructure 69
Installing Double-Take Availability automatically 71
Installing or upgrading automatically to a local machine 73
Installing or upgrading automatically to a remote machine 74
Configuring your cluster for GeoCluster installation 75
Configuring your Windows 2003 cluster 76
Configuring your Windows 2008 cluster 77
Double-Take Console 79
Starting the console 80
Getting started 81
Inserting servers manually 82
Inserting servers through Active Directory discovery 83
Inserting servers from a server configuration file 84
Managing servers 85
Viewing server details 87
Viewing server events 89
Providing server credentials 90
Managing VirtualCenter servers 91
Console options 92
Setting the frequency of console refreshes 93
Setting the console communications port 94
Updating the console software 95
Other consoles 96
Replication Console 97
Logging on and off 98
Managing the Replication Console tree 101
Creating groups 102
Removing groups 103
Moving Servers 104
Inserting Servers 105
Removing Servers 106
Hiding Servers 107
Unhiding Servers 108
Sharing group and server configuration 109
Workspaces 110
Saving a workspace 111
Opening a workspace 112
Clearing maintained security credentials 113
Failover Control Center 114
Configuring communication ports 115
Configuring the console refresh rate 116
Clearing maintained security credentials 117
Full-Server Failover Manager 118
Configuring the console refresh rate 119
Configuring the level of detail to log 120
Clearing maintained security credentials 121
Configuring the monitoring method for server availability 122
Saving and reusing configuration options 123
Application Manager 124
Adding or managing servers 125
Changing Application Manager options 126
Double-Take Availability for VMware Infrastructure console 127
Managing activation codes 128
Managing VirtualCenter servers 129
Managing ESX servers 130
Setting up an e-mail server 131
Workload protection 132
Data protection 133
Establishing a connection using the automated Connection Wizard 134
Creating a replication set 137
Establishing a connection manually using the Connection Manager 139
Establishing a connection across a NAT or firewall 145
Simulating a connection 147
Data workload failover 150
Configuring failover monitoring 151
Updating shares on the target 158
Editing failover monitoring configuration 159
Removing failover monitoring configuration 160
Server settings 161
Identifying a server 162
Licensing a server 164
Configuring server startup options 166
Configuring network communication properties for a server 169
Queuing data 170
Configuring source data processing options 174
Configuring target data processing options 177
Specifying the Double-Take Availability database storage files 180
Specifying file names for logging and statistics 182
Supplying credentials for script processing 184
E-mailing event messages 185
Full-server protection 188
Finding a compatible target 189
Establishing full-server protection 192
Optional full-server protection settings 194
Including and excluding data to be protected 195
Stopping services on the target when protection is enabled 196
Taking snapshots of the target 197
Configuring failover monitoring and processing 198
Mapping network configuration on the target for post-failover 199
Routing data transmissions 201
Mirroring data 202
Compressing data 203
Using NAT or firewalls with full-server workloads 204
Full-server ports 205
Microsoft Windows ports 206
Hardware ports 207
Application protection 208
Protecting an application 209
Optional application protection settings 217
Configuring failover processing 218
Configuring DNS failover 220
Configuring identity failover 223
Configuring failover monitoring 225
Taking snapshots of the target 228
Application connection settings 229
Routing data transmissions 230
Protection configuration 231
Configuring Exchange storage group protection 232
Configuring SQL database protection 234
Configuring file server protection 238
Configuring BlackBerry database protection 239
Configuring SharePoint database protection 241
Mirroring data 244
Application advanced settings 245
Configuring the replication set 246
Configuring scripts 248
Configuring Active Directory 249
Configuring items to failover 251
Configuring default connection parameters 252
Using NAT or firewalls with application workloads 253
Application workload ports 254
Microsoft Windows ports 255
Hardware ports 256
Exchange Failover Utility 257
Virtual server protection 260
Protecting a physical or virtual server to a Hyper-V or ESX server 261
Protecting a Hyper-V server to a Hyper-V server 272
Protecting an ESX server to an ESX server 279
Configuring ports 280
Configuring root or non-root login 281
Establishing ESX to ESX protection 282
Optional ESX protection settings 289
Scheduling protection 290
Changing the name of the protection job 291
Setting transmission options 292
E-mailing notifications 294
Updating VirtualCenter credentials 295
Configuring restart and threshold options 296
Using firewalls with virtual workloads 297
Virtual workload ports 298
Microsoft Windows ports 299
Hardware ports 300
Cluster protection 301
Protecting a standard cluster 302
Establishing your connection on Windows 2003 308
Establishing your connection on Windows 2008 312
Protecting a GeoCluster 319
Creating the GeoCluster Replicated Disk Resource on Windows 2003 320
Creating the GeoCluster Replicated Disk Resource on Windows 2008 322
Bringing the resource online 324
Taking the resource offline 325
GeoCluster resource properties 326
GeoCluster Replicated Disk properties on Windows 2003 327
GeoCluster Replicated Disk properties on Windows 2008 330
Configuring failover monitoring 333
Special configurations 334
Domain controllers 335
NetBIOS 336
WINS 337
WINS registration 338
WINS replication 339
DNS 340
Windows DNSCMD command 341
Double-Take Availability DFO utility 343
Non-Microsoft DNS 347
Macintosh shares 349
NFS Shares 351
Workload monitoring 352
Data workloads 353
Monitoring a data workload 354
Connection statistics 355
Connection and sever display 360
Monitoring failover monitoring 363
Monitoring a full-server workload 366
Monitoring an application workload 368
Monitoring virtual workloads 371
Monitoring virtual workloads in the Double-Take Console 372
Overview connection information displayed in the top pane 373
Filtering the connections displayed in the top pane 375
Detailed connection information displayed in the bottom pane 376
Connection controls available in the bottom pane 378
Viewing connection details 380
Monitoring virtual workloads in the Double-Take Availability for VMware
Infrastructure console 384
Overview connection information displayed in the top pane 385
Detailed connection information displayed in the bottom pane 386
Connection controls 387
Monitoring a cluster workload 388
Resolving an online pending GeoCluster Replicated Disk resource 389
GeoCluster Replicated Disk Status Resource 392
Log files 393
Viewing the log file 394
Viewing the log file through the Replication Console 395
Viewing the log file through a text editor 398
Filtering the log file 400
Configuring the properties of the log file 402
Double-Take Availability log messages 403
Monitoring event messages 410
Event messages 411
E-mailing event messages 438
Statistics 441
Configuring the properties of the statistics file 442
Viewing the statistics file 444
Statistics 446
Performance Monitor 453
Monitoring Performance Monitor statistics 454
Performance Monitor statistics 455
SNMP 459
Configuring SNMP on your server 460
SNMP traps 461
SNMP statistics 464
Error codes 468
Failover 474
Failing over data workloads, application workloads configured for identity
failover, and cluster workloads 475
Full-server workload failover 479
Failing over using the Full-Server Failover Manager 480
Failing over from the command line 483
Failing over application workloads configured for DNS failover 486
Virtual workload failover 491
Failing over virtual workloads in the Double-Take Console 492
Failing over virtual workloads in the Double-Take Availability for VMware
Infrastructure console 493
Failback and restore 494
Data workload failback and restoration 495
Restoring then failing back 496
Failing back then restoring 502
Failing back and restoring a full-server workload 507
Application failback and restoration 508
Failback and restoration for applications configured for identity failover 509
Restoring then failing back applications configured for DNS failover 512
Restoring then failing back virtual workloads 515
Connections 516
Data queues 517
Queuing data 519
Auto-disconnect and auto-reconnect 523
Reconnecting automatically 525
Pausing and resuming target processing 526
Blocking writing to the target paths 527
Disconnecting a connection 528
Mirroring 529
Stopping, starting, pausing, or resuming mirroring 530
File difference mirror options compared 531
Mirroring automatically 532
Running scripts during mirroring 534
Removing orphan files 537
Replication 540
Replication capabilities 541
Replication sets 545
Creating a replication set 549
Creating or modifying replication rules manually 551
Modifying a replication set 553
Renaming and copying a replication set 554
Calculating replication set size 555
Deleting a replication set 557
Starting replication 558
Inserting tasks during replication 559
Verification 560
Verifying manually 561
Verifying on a schedule 563
Configuring the verification log 565
Verify applications on the target 570
Verifying applications on the target from the command line 572
Data transmission 575
Stopping, starting, pausing, and resuming transmission 576
Scheduling data transmission 577
Limiting transmission bandwidth 583
Compressing data for transmission 587
Snapshots 589
Snapshots for data workloads 591
Snapshot states 592
Automatic snapshots 596
Scheduling snapshots 597
Taking snapshots manually 599
Managing full-server and application snapshots 600
Security 602
Security credentials 603
Adding users to the security groups 605
Changing the account used to run the Double-Take service 606
Configuring the Double-Take service for Active Directory 608
Evaluations 610
Evaluating data protection 611
Establishing a connection 612
Monitoring the activity and completion of the initial mirror 614
Changing data to cause replication 615
Verifying the data changes on the target 617
Testing your target data 619
Configuring failover monitoring 621
Monitoring failover 623
Simulating a failure 625
Simulating data changes after failover 626
Initiating failback 627
Restoring your data 629
Evaluating full-server protection 631
Establishing full-server protection 632
Monitoring the activity and completion of the initial mirror 634
Changing data to cause replication and verifying the data changes 635
Simulating a failure 636
Starting failover 637
Index 639
Double-Take Availability overview
Double-Take Availability ensures the availability of critical workloads. Using real-time
replication and failover, you can protect data, individual applications, entire servers, or
virtual machines.
Identify your critical workload on your production server, known as the source, and
replicate the workload to a backup server, known as the target. The target server, on a
local network or at a remote site, stores the copy of the workload from the source.
Double-Take Availability monitors any changes to the source workload and sends the
changes to the copy stored on the target server. By replicating only the file changes
rather than copying an entire file, Double-Take Availability allows you to more efficiently
use resources.
Mirroring has a defined end point - when all of the selected files from the source have
been transmitted to the target. When a mirror is complete, the target contains a copy of
the source files at that point in time.
Unlike mirroring which is complete when all of the files have been transmitted to the
target, replication continuously captures the changes as they are written to the source.
Replication keeps the target up-to-date and synchronized with the source.
When a restoration is complete, the source and target are again synchronized.
Replication continues from the target to the source, keeping the two servers
synchronized, until you disconnect the restoration connection.
Description
One target server, having no production activity, is dedicated to support
one source server. The source is the only server actively replicating data.
Applications
l This configuration is appropriate for offsite disaster recovery, failover,
and critical data backup. This is especially appropriate for critical
application servers such as Exchange, SQL Server, and web servers.
l This is the easiest configuration to implement, support, and maintain.
Considerations
l This configuration requires the highest hardware cost because a target
server is required for every source server.
l You must pause the target when backing up database files on the
target.
Description
Each server acts as both a source and target actively replicating data to
each other
Applications
This configuration is appropriate for failover and critical data backup. This
configuration is more cost-effective than the Active/Standby configuration
because there is no need to buy a dedicated target server for each source.
In this case, both servers can do full-time production work.
Considerations
l Coordination of the configuration of Double-Take Availability and other
applications can be more complex than the one-to-one active/standby
configuration.
l During replication, each server must continue to process its normal
workload.
l Administrators must avoid selecting a target destination path that is
included in the source’s replication set. Any overlap will cause an
infinite loop.
l To support the production activities of both servers during failover
without reducing performance, each server should have sufficient disk
space and processing resources.
l Failover and failback scripts must be implemented to avoid conflict with
the existing production applications.
l You must pause the server when backing up database files.
Description
Many source servers are protected by one target server.
Applications
This configuration is appropriate for offsite disaster recovery. This is also
an excellent choice for providing centralized tape backup because it
spreads the cost of one target server among many source servers.
Considerations
l The target server must be carefully managed. It must have enough disk
space and RAM to support replication from all of the source systems.
The target must be able to accommodate traffic from all of the servers
simultaneously.
l If using failover, scripts must be coordinated to ensure that, in the event
that the target server stands in for a failed server, applications will not
conflict.
l You must pause the target when backing up database files on the
target.
Description
One source server sends data to multiple target servers. The target
servers may or may not be accessible by one another.
Applications
This configuration provides offsite disaster recovery, redundant backups,
and data distribution. For example, this configuration can replicate all data
to a local target server and separately replicate a subset of the mission-
critical data to an offsite disaster recovery server.
Considerations
l Updates are transmitted multiple times across the network. If one of the
target servers is on a WAN, the source server is burdened with WAN
communications.
l You must pause the target when backing up database files on the
target.
Description
The source servers sends replicated data to a target server, which acts as
a source server and sends data to a final target server, which is often
offsite.
Applications
This is a convenient approach for integrating local high availability with
offsite disaster recovery. This configuration moves the processing burden
of WAN communications from the source server to the target/source
server. After failover in a one-to-one, many-to-one, or one-to-many
configuration, the data on the target is no longer protected. This
configuration allows failover from the first source to the middle machine,
with the third machine still protecting the data.
Considerations
l The target/source server could become a single point of failure for
offsite data protection.
l You must pause the target when backing up database files on the
target.
Note: Microsoft Server Core is supported for data workloads. See the specific
requirements for the workload type you are protecting for additional Server
Core requirements.
Each of the Windows 2003 operating systems require Service Pack 1 or
later.
l Foundation Edition
l Standard Edition
l Advanced Edition
l Premium Edition
l Virtual Guest 5-Pack Edition
l Virtual Host Standard Edition
l Virtual Host Advanced Edition
l Virtual Host Premium Edition
l File system—Double-Take Availability supports the same file system format that
Microsoft supports: FAT, FAT32, and NTFS.
l System memory—There are different memory requirements depending on the
operating system you are using. Be sure you have at least the minimum amount of
memory for your environment. You may want to consider having at least the
recommended amount of system memory.
l i386 operating systems—The minimum system memory is 128 MB. The
recommended system memory is at least 512 MB.
l x64 operating systems—The minimum system memory is 512 MB. The
recommended system memory is at least 1024 MB.
l Disk usage—The amount of disk space required for the Double-Take Availability
program files is approximately 70 MB. You will need to verify that you have
additional disk space for Double-Take Availability queuing, logging, and so on.
Note: The program files can be installed to any volume while the Microsoft
Windows Installer files are automatically installed to the operating system
boot volume.
Note: If you are using Small Business Server, you will need to check with your NAS
vendor to verify if there are technical or license restrictions on failing over an
image of a server to different hardware.
Microsoft Server Core is only supported in a Server Core to Server Core
configuration.
There is one limitation for full-server protection of a cluster. Microsoft clusters identify
disks by their disk signature, which is stored on the physical disk in the master boot
record. When Double-Take Availabilityis used to failover a cluster node, the disk
signature of the target will be different than the source and the cluster will fail to start.
Therefore, Double-Take Availability does not natively support the full-server protection of
Microsoft cluster nodes. However, you can alter the disk signature on the target
manually. See the Microsoft Knowledge Base article 280425 for details on how to
change the disk signature.
Note: If you are protecting Exchange in a 2008 R2 domain where the domain
functional level is set to R2, you must grant two levels of access to the local
system account on the target. First, grant the Administer information store
Note: If you are using the Standard edition of ESX 4.0 or ESXi 4.0, you must
have update 1 or later.
If your source is a Windows 2008 R2 server, your ESX server must
have version 3.5 update 5 or later or ESX 4.0 update 1 or later.
Note: If your source and target are running on different versions of ESX,
ideally, the target should be a newer version of ESX. If your source
must be a newer version of ESX than the target, you must take into
consideration ESX features that are supported on the newer version
on the source (like VmxNet enhanced or additional virtual NICs
available) that will not be supported on the earlier target version of
ESX
.
DTSetupType
l DTNT—Both the Double-Take Availability server and client
components will be installed.
l DTCO—Only the Double-Take Availability client components will be
installed.
l DTSO—Only the Double-Take Availability server components will be
installed.
If you are installing on Windows Server Core or Windows Hyper-V Server
(standalone), the setup type will be server components only regardless of
your setting.
DTActivationCode
A 24 character, alpha-numeric activation code which applies the
appropriate license to the server. Multiple activation codes can be
separated by a semi-colon.
DoubleTakeFolder
Any valid path specifying the location of the Double-Take Availability files
QMemoryBufferMax
Any integer representing the amount of system memory, in MB, to use for
memory-based queuing
Note: You must have Microsoft .NET installed on server before starting the automatic
installation.
If you are using Windows 2008, but you are not using the built-in administrator
account, Windows 2008 User Access Control will prompt you to confirm you want
to install Double-Take Availability. To work around this issue, use the built-in
administrator account when you are installing to each server. You may also
disable User Access Control if that is acceptable for your environment.
Note: The command must be run from the directory where the temporary files are
located as well as specifying that directory for the .ini file.
Spacing is critical with this command. A space should precede /s, /v, and
/qn but should not appear anywhere else for the command to work correctly.
Note: The command must be run from the shared folder as well as specifying that
directory for the .ini file.
Substitute your mapped drive for m:\.
Spacing is critical with this command. A space should precede /s, /v, and
/qn but should not appear anywhere else for the command to work correctly.
Note: If you are upgrading from a previous GeoCluster version and were using
GeoCluster as a quorum, you must select another quorum type. GeoCluster can
no longer be used as a quorum resource.
l Local Quorum—This quorum is for single node clusters and shared disk clusters.
It cannot be used in a GeoCluster configuration.
l Majority Node Set—This quorum is for clusters with three or more nodes.
l Majority Node Set with File Share Witness—This quorum is for clusters with only
two nodes. If you are using Windows 2003 Service Pack 1 or earlier, see the
Microsoft support article 921181 for an update for the File Share Witness. If you are
using Service Pack 2 or later, the update is not needed.
Use the following instructions as a guideline for configuring your Windows 2003 cluster.
See your Windows cluster documentation as a complete reference.
1. Login with an account that has administrative rights on the domain and the local
machine.
2. Create the cluster on the first node, if it is not already created. See your Windows
documentation for instructions on how to create a cluster.
3. Add your additional nodes to the cluster. See your Windows documentation for
instructions on how to add nodes to the cluster.
4. Install GeoCluster on each node of the cluster.
5. Configure your quorum. See your Windows documentation for instructions on
configuring the quorum appropriate for your environment.
6. If desired, you can install GeoCluster on non-clustered client machines if you want
to use Cluster Administrator to control the GeoCluster resources. Install
GeoCluster, selecting the Client Components Only installation option.
Note: If you are creating a file server using clustered file shares, the path for the
file share in the Failover Cluster Management wizard is case-sensitive. If
the drive letter is uppercase, the path in the clustered file share wizard must
also be uppercase. If the case does not match, the wizard will fail stating the
path does not exist.
9. If you are using Hyper-V, add your virtual machine resource to the group. Any
warnings about storage may be disregarded because the GeoCluster Replicate
Disk will alleviate storage requirements.
The appearance of the Home page is the same for all users. However, other console
pages may have variances in the appearance or you may not see some pages at all.
The pages and views depend on the Double-Take Software products that you have
installed.
l Starting the console
l Getting started
l Managing servers
l Console options
l Other consoles
Column 1 (Blank)
The first blank column indicates the status of communications between the
console and the server.
Add Servers
Add a new server. This button leaves the Manage Servers page and
opens the Add Servers page
Remove Server
Remove the server from the console
Provide Credentials
Change the login credentials for a server
Server name
The server name or IP address as added to the console
Status
There are many different Status messages that keep you informed of the
server activity. Most of the status messages are informational and do not
require any administrator interaction. If you see error messages, check the
rest of the server details.
Activity
There are many different Activity messages that keep you informed of the
server activity. Most of the activity messages are informational and do not
require any administrator interaction. If you see error messages, check the
rest of the server details.
Protocol
l Automatically detect protocol—The console automatically
determined the protocol type to use to communicate with the server.
l XML web services protocol—XML web services is the protocol being
used to communicate with the server. This server should be running
Double-Take version 5.2 or later.
l Legacy protocol—Double-Take legacy, proprietary protocol is being
used to communicate with the server. This server should be running
Double-Take version 5.1 or earlier.
Port
The port used for communication with the server
Version
The product version information
Access
The security level granted to the specified user
User name
The user account used to access the server
VirtualCenter Server
The name of the VirtualCenter server
Full Name
The full name of the VirtualCenter server
User Name
The user account being used to access the VirtualCenter server
Remove Server
Remove the VirtualCenter server from the console.
Provide Credentials
Edit credentials for the selected VirtualCenter server. When prompted,
specify a user account to access the VirtualCenter server.
Note: If you are using an older Double-Take version, you will need to use the legacy
protocol port. This applies to Double-Take versions 5.1 or earlier.
Note: You may not have access to some of the components or see certain display
options if you are using a newer version of the Replication Console to control an
older version of your source or target.
If you are logged in locally to the machine running the Replication Console, there
will be no servers automatically populated in the Servers tree. You will have to
manually insert each server.
Note: When logging in, the user name, password, and domain are limited to 100
characters.
If your activation code is missing or invalid, you will be prompted to open
the Server Properties General tab to add or correct the code. Select Yes to
open the Server Properties dialog box or select No to continue without
adding an activation code.
If the login does not complete within 30 seconds, it is automatically
canceled. If this timeout is not long enough for your environment, you can
increase it by adjusting the Communication Timeout on the
Configuration tab of the Replication Console properties. Select File,
Options, from the Replication Console to access this screen.
Double-Take Availability uses ICMP pings to verify server availability
during the login process. If your Double-Take Availability server is across a
router or firewall that has ICMP pings disabled, you will need to disable the
Double-Take Availability ICMP ping verification. To do this, select File,
Options, from the Replication Console and disable Use ICMP to verify
server availability.
Double-Take Availability uses the current user's login credentials to attempt
to log in to servers. This is called a unified login. If you want to disable
unified logins, select File, Options, from the Replication Console and
enable Use Named Pipes for Login.
Note: The remove toolbar button also removes servers and replication sets, so make
sure you have the correct item highlighted before clicking the toolbar button.
You cannot remove the default Discovered Servers group.
Servers that are auto-populated can be moved to different groups within the Replication
Console tree. You can move servers to groups by either of the following methods
l Drag and drop a server into the desired group. With this method you can move one
server at a time in the left pane of the Replication Console. You can move more
than one server at a time by using this method from the right pane of the
Replication Console.
l Insert a server into the desired group. Inserting an existing server to the tree will
move the first occurrence to that new location.
A Double-Take Availability server will only appear once within the entire Replication
Console tree. Servers cannot be placed into multiple groups.
Use the following instructions to insert a server into the Replication Console.
1. A server that already exists in the tree will be moved to the currently selected group
if you attempt to insert it again.
2. Right-click on a group and select New, Server or highlight a group and select
Insert, Server.
3. Type the machine name or IP address and the port number, if it is different than the
default.
4. Click Test to determine if the machine is running Double-Take Availability. At any
time while Double-Take Availability is attempting to locate the machine, click Stop
to cancel the test. If you do not manually test a machine before inserting it, Double-
Take Availability will automatically test it for you.
5. Click OK to insert the server or Cancel if you do not want to insert that server.
Even if a machine is not running Double-Take Availability, you can still insert it in the
Replication Console.
If you do not want to see a server in the Replication Console, it can be permanently
removed from the display. You might need to remove a server that was manually added,
if that server is no longer needed. Or if there are servers within the network that another
administrator is responsible for, you can remove them from your display.
If a server is listed in Active Directory and Active Directory discovery is enabled, a
removed server will automatically be added back to the server list .
To remove a server, right-click on the server in the left or right pane of the Replication
Console and select Remove. You can also select Remove Item from the toolbar.
If Active Directory discovery is enabled on the Replication Console, those servers that
have Active Directory advertisement enabled will automatically be repopulated back in
the default Discovered Servers group. If Active Directory discovery is disabled on the
Replication Console or for individual servers, servers will need to be manually inserted
into the Replication Console.
Note: The remove toolbar button also removes servers and replication sets, so make
sure you have the correct item highlighted before clicking the toolbar button.
You cannot remove the default Discovered Servers group.
If you do not want to see a server in the Replication Console and do not want to disable
Active Directory discovery, you can hide the server from view. This keeps the server in
the Replication Console’s internal list of servers, but does not display it in the server
tree, any dialog boxes, or any field/menu selections.
To hide a server, right-click on a server in the left or right pane of the Replication
Console and select Hide.
Note: If you attempt to insert a server that is already in the tree but hidden, you will be
prompted to unhide the server and insert it into the selected group.
Be careful if you hide a server with an established Double-Take Availability
connection. If that connection goes into an error state, you will not be able to see
the connection in the Replication Console. The Double-Take Availability log,
Event Viewer, and other monitoring methods will still be functioning to alert you to
the error. Hiding the server only removes it from the Replication Console display.
If a target server with an established Double-Take Availability connection is
hidden and you open the Connection Manager for that connection via the source,
you will see the target and IP address displayed in the Target and Route fields,
respectively. This is the only time you will see a hidden server.
You can unhide, or display, a hidden server at any time you want to access that server.
The server will be displayed in the server tree, all dialog boxes, and field/menu
selections.
To unhide, or display, a hidden server, you can insert the server or use the following
instructions.
1. Select View, Unhide Servers.
2. Select one or more servers by using Ctrl-click or Shift-click. You can also click
Select All to select all of the servers in the list.
3. Click Unhide.
Before moving a group that contains at least one subgroup with at least two hidden
servers, you must unhide all of the servers. After the servers have been unhidden, move
the group and then hide the servers again. Any attempt to move a group containing
subgroups with hidden servers will result in an error when saving the workgroup or
exiting the Replication Console.
As you size, add, or remove windows in the Replication Console, you can save the
workspace to use later or use on another Double-Take Availability client machine.
Select File and one of the following options.
l Save Workspace—Save the current workspace. If you have not previously saved
this workspace, you must specify a name for this workspace.
l Save Workspace As—Prompt for a new name when saving the current
workspace.
From the Replication Console, you can open a new workspace or open a previously
saved workspace. Select File and one of the following options.
l New Workspace—Open an untitled workspace with the default Double-Take
Availability window settings.
l Open Workspace—Open a previously saved workspace.
Note: Because network adapters are uniquely identified on each server, the Network
Mappingis not stored in the default settings.
If you want to reset the configuration settings back to the default settings, select File,
Defaults, Reset Defaults.
Note: You can also start the Application Manager from the command line.
l To start it in standard mode, run the command dtam /application, where
/application is /exchange, /sql, /fileprint, /blackberry, or /sharepoint.
l To start it in advanced mode, run the command dtam /application /advanced,
where /application is /exchange, /sql, /fileprint, /blackberry, or /sharepoint.
The Application Manager allows you to establish application protection, monitor that
protection, and initiate application failover and failback.
When you select an application to protect in the Tasks list on the left pane, the Setup
tab on the right pane is a simple interface with four numbered steps. Steps 1 and 2 are
for the domain and servers. Step 3 is optional configuration and step 4 validates the
servers.
After protection has been established, use the Monitor tab to check on the status of your
protection.
1. Click Search to locate all the application servers that Application Manager can
discover in the domain. If you have a large number of servers in Active Directory,
this search may take awhile.
2. Highlight servers in the Discovered Servers list and move them to the Current
Servers list to add them to the Application Manager console.
3. To add a non-discovered server, type the server name below the Current Servers
list and click Add.
4. To remove any servers from the Application Manager console, highlight the server
name in the Current Servers list and click Remove.
5. For some applications, you can click the Test SQL button to have Application
Manager check to see if the application is installed and accessible on the selected
server.
6. When you have finished managing your servers, click OK.
Enter a new activation code and click Add. To remove a code, highlight in the list and
click Remove.
Each activation code corresponds to a number of slots, where each slot represents the
capacity to protect a single virtual machine in your environment. Each time protection is
established, Double-Take Availability for VMware Infrastructure will update the available
number of slots for subsequent protections.
Note: If you are using VMware bundle licensing, each slot represents an ESX server,
rather than a protection. Therefore, entering an ESX host by IP address and
again by DNS name will cause a duplicate entry using an additional license slot.
Therefore, when you add ESX servers, enter either the IP address or the DNS
name but not both.
Note: If the Servers root is highlighted in the left pane of the Replication Console,
the Connection Wizard menu option will not be available. To access the
menu, expand the server tree in the left pane, and highlight a server in the
tree.
2. The Connection Wizard opens to the Welcome screen. Review this screen and
click Next to continue.
Note: At any time while using the Connection Wizard, click Back to return to
previous screens and review your selections.
3. If you highlighted a source in the Replication Console, the source will already be
selected. If it is not, select the Double-Take Availability source. This is the server
where the files reside that you want to protect.
Note: The default number of files that are listed in the right pane of the Replication
Console is 2500, but this is user configurable. A larger number of file
listings allows you to see more files in the Replication Console, but results
in a slower display rate. A smaller number of file listings displays faster, but
may not show all files contained in the directory. To change the number of
files displayed, select File, Options and adjust the File Listings slider bar
to the desired number.
To hide offline files, such as those generated by snapshot applications,
select File, Options and disable Display Offline Files. Offline files and
folders are denoted by the arrow over the lower left corner of the folder or
file icon.
4. Identify the data on the source that you want to protect by selecting volumes,
drives, directories, and/or specific files.
5. After selecting the data for this replication set, right-click the new replication set
icon and select Save. A saved replication set icon will change from red to black.
Note: If you are mirroring and replicating dynamic volumes or mount points,
your location on the target must be able to accommodate the amount
of data that you are replicating.
If you are mirroring and replicating sparse files and your location on
the target is a non-NTFS 5 volume, the amount of disk space
available must be equal to or greater than the entire size of the sparse
file. If you are mirroring and replicating to an NTFS 5 volume, the
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
Note: The settings on the other tabs of the Connection Manager are advanced
settings. You can modify any of them before or after establishing your
connection.
If you decide to enable orphan file processing while you are establishing
your connection, orphan files will not be immediately processed when you
create the connection. This setting is for processes that are run after a
connection is already established (remirror, auto-remirror, verification, and
so on).
Note: If you change any of the port settings, you must stop and restart the
Double-Take service for the new port setting to take effect.
Note: If the target you need is not listed, click Add Target and manually enter a
name or IP address (with or without a port number). You can also select the
Browse button to search for a target machine name. Click OK to select the
target machine and return to the Failover Control Center main window.
l Type the name of the machine that you want to monitor in Machine Name(s)
and click OK.
l Click Browse to search for a machine. Select a domain from the list box at
the top of the Select Machine dialog box to list the available machines for that
domain. Highlight a source to be monitored and click OK.
l Click Custom. Enter the name of the server and click Add. Specify the IP
address and subnet mask of the specified server and click OK. Click OK
again.
The Insert Source Machine dialog closes and the Monitor Settings dialog
remains open with your source listed in the Names to Monitor tree.
6. In the Names to Monitor tree, locate and select the IP addresses on the source
that you want to monitor.
Note: To achieve shorter delays before failover, use lower Monitor Interval and
Missed Packets values. This may be necessary for servers, such as a web
server or order processing database, which must remain available and
responsive at all times. Lower values should be used where redundant
interfaces and high-speed, reliable network links are available to prevent
the false detection of failure. If the hardware does not support reliable
communications, lower values can lead to premature failover. To achieve
longer delays, choose higher values. This may be necessary for machines
on slower networks or on a server that is not transaction critical. For
example, failover would not be necessary in the case of a server restart.
Note: Automatic share failover only occurs for standard Windows file system
shares. Other shares must be configured for failover through the
failover scripts or created manually on the target. See Macintosh
shares or NFS Shares for more information.
If you are failing over Windows shares but your source and target do
not have the same drive letters, you must use the All to One selection
when establishing your Double-Take Availability connection.
Otherwise, the shares will not be created on the target during failover.
If a Windows share is created on Windows 2003 with the default full
access permissions (without an ACL) and then failed over, the
permissions given to the target will be read-only permissions.
Windows share information is automatically updated on the target
once an hour. If you need to manually update the share information,
click Update Shares on the main Failover Control Center window after
the monitor has been established.
15. By default, Manual Intervention is enabled, allowing you to control when failover
occurs. When a failure occurs, a prompt appears in the Failover Control Center
and waits for you to manually initiate the failover process. Disable this option only
if you want failover to occur immediately when a failure occurs. This option is not
configurable if the Method to Monitor for Failover is set to No Monitoring.
16. If the Shares selection under Items to Failover is selected, verify that the Use
Note: If the Shares selection under Items to Failover is not selected, shares will
not be failed over to the target regardless of the Use .SHR Share Mapping
File selection.
17. By default, Failover Hostname is disabled. This option automatically removes the
host SPN (Service Principle Name) from Active Directory on the source and adds it
to Active Directory on the target. If you are using Active Directory, enable this
option or you may experience problems with failover.
18. Failback Hostname returns the host SPN on the source and target back to their
original settings on failback. If you are using Active Directory, enable this option or
you may experience problems with failback.
19. If you are failing over or failing back hostnames, you need to specify an Active
Directory user that has update privileges within Active Directory. Click Credentials
and identify a user and the associated password that has privileges to create and
delete SPNs. The username must be in the format fully_qualified_domain\user.
Click OK to return to the Monitor Settings dialog box.
20. If you are using any failover or failback scripts, click Scripts and enter the path and
filename for each script type. Scripts may contain any valid Windows command,
executable, or batch file. Examples of functions specified in scripts include
stopping services on the target before failover because they may not be necessary
while the target is standing in for the source, stopping services on the target that
need to be restarted with the source’s machine name and IP address, starting
services or loading applications that are in an idle, standby mode waiting for
failover to occur, notifying the administrator before and after failover or failback
occurs, stopping services on the target after failback because they are no longer
needed, stopping services on the target that need to be restarted with the target
machine’s original name and IP address, and so on. Specify each script that you
want to run and the following options, if necessary.
Note: Failover scripts will run but will not be displayed on the screen if the
Double-Take service is not set to interact with the desktop. Enable this
option through the Services applet.
With these flexible scripting features, application failover using Double-
Take Availability can be seamless to the end user. Double-Take Software
tests many of the popular applications on the market today. The results of
these testing procedures are written up into formal Application Notes that
describe how Double-Take Availability should be configured to work
correctly with certain applications, including scripting examples. For a
complete list of Double-Take Availability Application Notes, visit the
Double-Take Software support web site.
22. Click OK on the Monitor Settings dialog box to save your monitor settings and
begin monitoring for a failure.
4. Specify the server identity information. Some of the fields are informational only.
l Nickname—A nickname is saved in the Replication Console workspace,
therefore, it only appears in the Replication Console on this server. It is not
communicated across the network. If you export a workspace and use it on
another Double-Take Availability server, the server nickname will appear
there also.
l Machine—This is the actual server name. This field is not modifiable.
4. Enter an activation code and click Add. Repeat for each activation code.
5. Highlight an activation code in the list to display any status messages for that code
below the list display.
6. If you need to remove a code from the server, highlight it in the list and click
Remove.
7. To update a temporary node-locked license to a permanent license, you need to
provide server information which will be used to generate a permanent node-
locked license.
8. Click OK to save the settings.
l Folder—This is the location where the disk queue will be stored. Double-
Take Availability displays the amount of free space on the volume selected.
Any changes made to the queue location will not take effect until the Double-
Take service has been restarted on the server.
When selecting the queue location, keep in mind the following caveats.
Note: Scanning the Double-Take Availability queue files for viruses can
cause unexpected results. If anti-virus software detects a virus in a
queue file and deletes or moves it, data integrity on the target cannot
be guaranteed. As long as you have your anti-virus software
configured to protect the actual production data, the anti-virus software
can clean, delete, or move an infected file and the clean, delete, or
move will be replicated to the target. This will keep the target from
becoming infected and will not impact the Double-Take Availability
queues.
Note: Database applications may update files without changing the date,
time, or file size. Therefore, if you are using database applications,
you should use the Block Checksum All Files on a Difference
Mirror option to ensure proper file comparisons.
If you are not using database applications, disabling this option will
shorten mirror times.
Note: If you are going to use failover, any target paths that are blocked will
automatically be unblocked during the failover process so that users
can modify data on the target after failover. During a restoration, the
paths are automatically blocked again. If you failover and failback
without performing a restoration, the target paths will remain
unblocked. You can manually block or unblock the target paths by
right-clicking on a connection.
Do not block your target paths if you are protecting a full-server
workload because system state data will not be able to be written to
the target.
Note: If deleted files are moved for long enough, the potential exists for the
target to run out of space. In that case, you can manually delete files
from the target move location to free space.
4. Specify the database files that store the Double-Take Availability replication set,
connection, and scheduling information.
l Folder—Specify the directory where each of the database files on this tab
are stored. The default location is the directory where the Double-Take
Availability program files are installed.
l Replication Set—This database file maintains which replication sets have
been created on the server along with their names, rules, and so on. The
default file name is DblTake.db.
4. Specify the location and file names for the log and statistics files.
l Folder—Specify the directory where each of the log files on this tab are
stored. The default location is the directory where the Double-Take
Availability program files are installed.
l Messages & Alerts, Maximum Length—Specify the maximum length of the
client and service log files. The default size is 1048576 bytes and is limited
by the available hard drive space.
4. If you will be using any customized scripts (mirroring, failover, task command
processing, and so on) specify a Username, Password, and Domain to use when
running the scripts. If you do not specify any security credentials, the account
running the Double-Take service will be used.
5. Click OK to save the settings.
Note: You can test e-mail notification by specifying the options on the E-mail
Notification tab and clicking Test. (By default, the test will be run from
the machine where the Replication Console is running.) If desired,
you can send the test message to a different e-mail address by
selecting Send To and entering a comma or semicolon separated list
of addresses. Modify the message text up to 1024 characters, if
necessary. Click Send to test the e-mail notification. The results will
be displayed in a message box. Click OK to close the message and
click Close to return to the E-mail Notification tab.
E-mail notification will not function properly if the Event logs are full.
If an error occurs while sending an e-mail, a message will be
generated. This message will not trigger an e-mail. Subsequent e-
mail errors will not generate additional messages. When an e-mail is
sent successfully, a message will then be generated. If another e-mail
fails, one message will again be generated. This is a cyclical process
where one message will be generated for each group of failed e-mail
messages, one for each group of successful e-mail messages, one for
the next group of failed messages, and so on.
If you start and then immediately stop the Double-Take service, you
may not get e-mail notifications for the log entries that occur during
startup.
By default, most virus scan software blocks unknown processes from
sending traffic on port 25. You need to modify the blocking rule so that
Double-Take Availability e-mail messages are not blocked.
4. Optional protection settings are available but not required. If desired, configure the
optional protection settings by clicking Configure protection.
5. You must validate that your target is compatible with your source and can stand-in
if the source fails. Click Validate configuration. The Validation tab at the bottom of
the Full-Server Failover Manager updates to display the validation check. Errors
are designated by a white X inside a red circle. Warnings are designated by a
black exclamation point (!) inside a yellow triangle. A successful validation is
designated by a white checkmark inside a green circle.
Note: After protection is enabled, a View Configuration link will display the optional
protection settings in read-only mode. If you need to modify any of the optional
protection settings, you will have to disable your protection, modify the optional
protection settings, and then re-enable protection.
If you have a full-server protection connection established, do not create any
other Double-Take Availability connections from or to the source or target.
If you are using a cluster, you must manually alter the disk signature before or
after failover. See the Microsoft Knowledge Base article 280425 for details on
how to change the disk signature. You can automate the disk signature alteration
as part of failover using the pre- or post-failover scripts.
Note: The fields in the Application Manager console will vary depending on the
type of application you are protecting.
3. Application Manager will automatically identify the root domain where the
Application Manager is running and populate the Domain Name field. If
necessary, change the domain name to a trusted root domain that the Application
Manager console can connect to. If prompted, enter security credentials with
administrator privileges for the domain.
Note: Domain names must include a suffix, such as .com, .corp, .net, and so on.
Exchange Note: If you are protecting Exchange, the domain must be the root of
the forest domain because that is where all Exchange server
objects reside, even if the Exchange server is a member of a
child domain.
4. Application Manager will automatically attempt to populate the Source Server and
Target Server lists with any servers in the specified domain that are running the
application you are protecting. Select your source and target servers.
Exchange Note: The target you select must be in the same Exchange
administrative group as the source.
If you are protecting Exchange 2003 and it is running in mixed
mode, the first installed Exchange virtual server contains the
MTA (Message Transfer Agent) resource that is needed to
communicate with versions prior to Exchange 2003. If you do
not failover all Exchange virtual servers, then any user who is in
a different mail store than the first one may not be able to route
mail.
SharePoint Note: If you are protecting SharePoint, enter the SharePoint Front-
End Web Server and click Get Config to populate the Source
Server list.
Note: You can enter a user for a different domain by entering a fully qualified
name in the format domain\username or username@domain. If you enter a
SQL Note: The login account must be assigned the System Administrator
role on the SQL server in order to query and administer SQL.
SharePoint Note: The login account must be assigned the System Administrator
role on the SQL server in order to query and administer SQL.
The login account must be the same farm administrator account
used when installing and configuring SharePoint.
BlackBerry Note: If the login account is the BesAdmin account, you will need to
add that account to the Double-Take Admin group on the
source and target servers.
6. Optional protection settings are available but not required. If desired, configure the
optional protection settings by clicking Configure.
7. Once you have finalized your protection settings, you need to validate your
configuration by clicking Validate. Monitor the status of the validation process in
the status bar at bottom of the Application Manager.
8. When the validation is complete, the status progress indicator is removed. Errors
are designated by a white X inside a red circle. Warnings are designated by a
black exclamation point (!) inside a yellow triangle. A successful validation is
designated by a white checkmark inside a green circle. Unknown items are a white
question mark inside a blue circle. Double-click on any of the validation items to
see details. Application Manager can automatically fix errors and warnings marked
with a yellow gear. Highlight a single item and click Fix to have Application
Manager fix that one issue. Click Fix All to have Application Manager correct all of
the issues. You must correct any errors, and ideally any warnings, before you can
enable protection.
Note: If you are using DNS failover and did not enter DNS credentials under the
optional protection settings, you will be prompted for credentials that can
SQL Note: If you are using Database Only mode and the database is
online on the target, the database cannot be taken offline on the
target by using Fix if it has a SQL Server replication publication.
The publication will have to be deleted using the SQL Server
management tools before the database can be taken offline.
For SQL 2000 servers, Application Manager may hang when
rerunning validation after disabling protection in the same
session. To work around this issue, disable the protection, stop
and restart the Application Manager, then validate or enable
protection.
Note: If you modify your source server configuration on the source server, for
example, adding a new storage group or database, you must disable
protection, run validation and fix any issues, then re-enable protection to
apply the changes.
If your application protection is in a cluster environment, you should not
move any resources from one cluster group to another once protection is
established.
If you close Application Manager prior to enabling protection, your
configuration changes will not be saved. You must enable protection in
order to save your configuration settings.
SQL Note: If you are protecting SQL on a cluster and the target cluster has
more than one IP address resource for the virtual SQL Server
server you may experience the following issue. If the one of the
IP addresses is not routable from the source server and that IP
address was created before any of the routable IP address
resources, the Application Manager will fail to enable
protection. To enable protection, you will need to delete the
non-routable IP address resource(s), re-create them, and then
re-add them as dependencies on the network name resource
for the virtual server.
Note: The fields on the Failover tab will vary depending on the type of application
you are protecting.
2. Specify the Failover Type which is the name resolution method that will be used
to redirect users to the target in the event the source fails. Ideally, you should use
DNS failover to reduce downtime and avoid server name or IP address conflicts.
However, you may want to select identity failover if access to the domain controller
or DNS server is not available, the time required to propogate DNS updates is
unacceptable, or your end-users are configured to connect to an IP address and
not a server name. For cluster environments, DNS failover is the only option
available.
Application Manager will automatically determine default DNS failover settings. Use the
following instructions to modify the DNS failover settings.
1. The DNS Server list contains all DNS IP addresses for the source and target
servers. The label after the IP address indicates if the DNS IP address belongs to
the source, target, or both. To additional DNS servers to the list, enter an IP
address into the DNS Server field and click Add. To remove an IP address from
the list, highlight the address and click Delete.
Note: If you want to set the primary DNS server that Double-Take Availability will
use during failover, you can specify Client DNS Server. This option is only
available if you have launch the Application Manager using the command
line advanced option.
Exchange Note: If you are protecting Exchange and one or more IP addresses
are configured for the SMTP virtual server on the target, the first
IP address will be the default target IP address for all source IP
addresses.
3. You can specify the length of time, in seconds, that the source's DNS A records are
cached in the Time to Live. Enable Update TTL and specify a number of seconds.
Ideally, you should specify 300 seconds (5 minutes) or less.
Note: In order to update the Time to Live, the machine where the Application
Manager is running must be able to connect to the DNS server through
WMI. If it cannot, the Time to Live record will not be updated and the
Application Manager will return an error that the RPC server is unavailable.
4. Specify DNS Credentials and specify a user that has privileges to access and
modify DNS records. The user must be a member of the DNSAdmins gruop for the
domain where the DNS server resides. You can enter a user for a different domain
by entering a fully qualified name in the format domain\username or
username@domain. If you enter a non-qualified name, the DNS domain from the
DNS server will be used.
5. Once your DNS failover settings are configured, click Test to validate your
configuration. If you have any issues with your configuration, review the following
DNS information.
l The DNS zone Dynamic updates should be set to Secure only. Otherwise,
you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
l DNS reverse lookup should be enabled For more information on enabling
reverse lookup, see your Microsoft documentation.
l If you are running Windows Server 2000 on the primary DNS server and are
hosting zones or domains that contain source and/or target records, you must
have the DNS WMI Provider installed on that DNS server.
l If a hosts file entry for the source server exists on end-user machines, errors
may occur during a failover and failback.
Application Manager will automatically determine default identity failover settings. Use
the following instructions to modify the identity failover settings.
1. Under Source IP address to failover, map a Source IP address to a Target NIC.
The target NIC will assume the source IP address during failover. The Target IP
addresses list displays the IP address(es) of the selected Target NIC.
2. The default selected items under Items to Failover will depend on the application
you are protecting. Enable or disable if you want to failover the source's IP
addresses, server name, file shares, and/or Active Directory host name.
Note: If your source and target are on different subnets, you should not failover the
IP address.
Exchange Note: If you are protecting Exchange, do not failover the Active
Directory host name.
File Server Note: You cannot failover file shares from a parent to child domain.
l Method to Monitor for Failover—You have three choices for having the
target monitor the source for a failure.
l Network Access—ICMP pings are used to determine if the source is online.
Network devices, such as firewalls or routers, must have ICMP pings
unblocked in order to use this option.
l Replication Service—The Double-Take service on the target sends a UDP
request to the source, which replies immediately to confirm it is online. Use
this method if ICMP pings are blocked.
Note: To achieve shorter delays before failover, use lower Monitor Interval
and Failure Count values. This may be necessary for IP addresses
on servers that must remain available and responsive at all times.
Lower values should be used where redundant interfaces and high-
speed, reliable network links are available to prevent the false
detection of failure. If the hardware does not support reliable
communications, lower values can lead to premature failover. To
achieve longer delays before failover, choose higher values. This may
be necessary for IP addresses on slower networks or on a server that
is not transaction critical. For example, failover would not be
necessary in the case of a server restart. Additionally, in a cluster
environment, you must take into account the time it will take for a
virtual server to failover between nodes.
l Monitored IPs—Mark the IP addresses on the source that you want the
target to monitor.
l Failover Trigger—Specify if you want failover to be triggered when all
monitored IP addresses fail or if only one of the monitored IP addresses fail.
l Application Monitoring Settings—If you selected Application Monitoring
as your Method to Monitor for Failover, you need to configure the script that
will monitor your application.
l Monitoring Option—You have a choice of two monitoring methods.
l Built-In Monitoring—Double-Take Availability will monitor the application
using WMI. Specify if you want Double-Take Availability to Attempt to
restart services if the application services are not responding.
l Customer Monitoring Script—Click Browse to locate your own custom
2. A snapshot is an image of data taken at a single point in time. Snapshots allow you
to view files and folders as they existed at points of time in the past, so you can, for
example, recover from cases where corrupted source data was replicated to the
target. By default, Double-Take Availability takes periodic snapshots of the data on
the target. When failover is triggered, you can use the live target data at the time of
failover or you can failover to a snapshot of the target data. Specify how you want
to handle snapshots.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
2. By default, Double-Take Availability will select the default Route for transmissions.
If desired, select a different IP address on the target that will be used for
transmissions. If you are using a cluster, use the virtual server IP address.
If you are protecting Exchange, you can specify which storage groups, mailboxes, and
public folder stores that you want to protect.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
2. The Protected Storage Groups will list the storage groups, mailboxes, and public
folder stores. By default everything is slected. Select the storage groups that you
want to protect. By selecting individual storage groups, you can reduce the amount
of data being replicated and filter out storage groups that do not need to be
protected or failed over. Only the users associated with the selected storage
groups will be failed over.
Note: If you do not select all storage groups, you should make sure that other
backups are available.
Ideally, you should place all query-based distribution groups in a single
organization container and give the target server full control to the container
and all child objects.
Names with a plus sign (+) are not supported. You must rename the storage
group and remove the plus sign.
3. If desired, you can select additional data to protect under the Volumes folder.
4. Click Refresh if you need to refresh the items in the tree view.
5. Click OK to save the settings.
If you are protecting SQL, you can protect the SQL instance or only the database only.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
2. Select if you want to protect the SQL Instance or the Database Only. The
Protected Databases options and list will be disabled if you have enabled
Override Generated Rules on the Advanced tab.
l SQL Instance—This option will protect the entire SQL program and data
files (except the \binn directory). With this option, end-users can access the
SQL data from the target in the event of a failure. With this option, the source
and target servers must have the following configuration.
l The servers must have the same version of SQL (major and minor
versions).
l The servers must have the same logical drive structure where the SQL
program and data files are stored.
If you are protecting a file server, you can specify the file shares that you want to protect.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
2. By default, all non-administrative file shares will be selected. Select or deselect the
file shares in the tree that you want to protect.
Note: The File Shares list will be disabled if you have enabled Override
Generated Rules on the Advanced tab.
If your source is a domain controller, you cannot protect the NETLOGON
and SYSVOL shares and they will not be visible in the File Shares tree.
3. If desired, you can select additional data to protect under the Volumes folder.
4. Click Refresh if you need to refresh the items in the tree view.
5. Click OK to save the settings.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
Note: You cannot deselect the databases containing the BES or MDS information.
If you do not want to protect the MDS database, deselect Protect MDS
services on the BlackBerry tab using the instructions below.
You may want to exlude the tempdb database to reduce mirroring and
replication traffic.
The Protected Databases list will be disabled if you have enabled
Override Generated Rules on the Advanced tab.
3. If desired, you can select additional data to protect under the Volumes folder.
4. Click Refresh if you need to refresh the items in the tree view.
5. Next select the BlackBerry tab.
6. Under BlackBerry Options select to Protect log files and/or Protect MDS
a. Click Add to insert a service into the list. Specify the service name and make
sure that Service must be stopped on target is enabled so that replication
can update files on the target.
b. Click Remove to remove a service from the list. You can only remove
services that you have manually added.
c. If you are configuring your services, highlight a service and click the up or
down arrow to reorder the list. The services will be stopped and started in the
order displayed.
8. Click OK to save the settings.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
2. By default, the entire SharePoint program and data files (except the \binn directory)
will be protected. End-users can access the data from the target in the event of a
failure.
Note: The servers must have the same version of SharePoint (major and minor
versions).
The servers must have the same logical drive structure where the
SharePoint program and data files are stored.
If you are using a SQL server named instance for a back-end database
server in your SharePoint setup, both the source and target SQL servers
must have the same named instances and the same logical drive structure.
You may want to exlude the tempdb database to reduce mirroring and
replication traffic.
3. If desired, you can select additional data to protect under the Volumes folder.
4. Click Refresh if you need to refresh the items in the tree view.
5. Next select the SharePoint tab. These options allow you to join or extend the
target front-end web server to the production SharePoint configuration or web farm.
Application Manager determines the Microsoft SQL server and configuration
database used by the source SharePoint web front-end server, then uses that
information to connect the specified target web server to the same SharePoint
configuration. The target web server specified can be local or remote.
Note: The target web server must have the same version of SharePoint installed
as the product SharePoint web server.
For best results, SharePoint should be installed but not yet configured on
the target web server.
In order to extend the target web server, you will need to add the
SharePoint administrator account to the local domain administrator group
on the target server before you extend target web front-end server into the
farm.
6. The first five fields will be filled in automatically. However, you can modify any of
the fields.
l Server Name—Enter the NetBIOS or physical name of the target SharePoint
web server.
l IP Address—Enter the IP address for the target web server.
l TCP Port—Enter the TCP port to be used for communicating with the target
web server.
l Config Database Server—Enter the name of the Microsoft SQL Server that
hosts the configuration database.
l Config Database Name—Enter the name of the configuration database for
the production SharePoint web front-end server.
l SharePoint Admin Name—Enter the account used to install and configure
SharePoint on the production SharePoint web front-end server. This should
be entered as a fully qualified domain name in the format domain\username.
Note: You must manually install the Central Administration web application after
the target has been extended in order to be able to administer SharePoint in
the event of a failover.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Connection tab.
Note: The fields on the Connection tab will vary depending on the type of
application you are protecting.
Application Manager automatically creates a replication set with a name based on the
application you are protecting. The list below contains the default replication set names,
where source and target are the names of the respective servers.
l Exchange—xdag01_source_target
l SQL—sqldag01_source_target
l File server—fileprint_source_target
l BlackBerry—BB_source_target
l SharePoint—SharePointdag01_source_target
Application Manager selects all of the necessary directories and files to add to your
replication set to protect your application. You should only modify the replication set
definition if there are additional directories or files that you want to protect. Do not modify
the rules unless you are familiar with Double-Take Availability and your application.
Exchange Note: If you are protecting Exchange and want to protect the Badmail folder,
you will need to manually add it using the instructions below.
SQL Note: If you are protecting SQL, the folder that contains a database’s
FILESTREAM data will automatically be included in the replication
set for protection if the database is included for protection. Any steps
previously taken to enable FILESTREAM support on the source (for
instance, file system or operating system-level changes that were
made specifically to support FILESTREAM) must also be applied
similarly to the target for consistency. Failure to account for
FILESTREAM-specific changes on the target server, or specifically
excluding FILESTREAM data files/paths from the replication set, can
impact SQL Server’s ability to mount a database with FILESTREAM
data when failing over.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Advanced tab.
2. To modify the replication set definition, select Override Generated Rules. When
this option is selected, the application controls (storage groups or protected
databases) on the Connection tab will be disabled.
3. To add a new replication set rule, click Add.
4. Specify a path, wild card, or specific file name. Application Manager will not verify
the rule you are adding.
5. Select to Include or Exclude the file.
6. Mark the rule as Recursive or Non-Recursive if you want the rule applied to
subdirectories.
7. Click Add.
8. Repeat steps 4 through 7 for each replication set rule you want to add.
9. When you are finished adding rules, click Close.
10. If you need to remove a rule, highlight it and click Remove. If you remove a rule
added by Application Manager, you could impact the success of failover.
11. Click OK to save the settings.
Scripts are executed at different points during failover, failback, and restoration. The
scripts perform actions to make your applications available on the appropriate server.
Editing scripts is an advanced feature. Do not modify the scripts unless you are familiar
with Double-Take Availability, your application, and scripting. Any edits should be made
carefully and tested prior to deployment to ensure the changes are correct. Incorrect
script changes could cause failover issues.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Advanced tab.
Note: The fields on the Advanced tab will vary depending on the type of
application you are protecting. In addition, the fields will vary depending on
if you launched Application Manager in standard or advanced mode.
2. Click on the button associated with the script you want to edit.
l Failover Script—This script is executed automatically on the target after the
core failover processes have completed.
l Failback Script—This script is executed automatically on the target before
the failback processes begin.
l Restore Script—This script is not executed automatically, but is available for
the source if needed.
l Post Failback Script—This script is not executed automatically, but is
available for the target if needed.
Any changes you save to the scripts will be copied to the appropriate server
when the configuration changes are accepted. If you reconfigure your
application protection after making script changes, Application Manager will
copy updated scripts to the appropriate server, overwriting any changes that
you manually made. You should make a backup copy of your script changes
to copy over after making Application Manager updates. If you want to make
the script changes permanent, you must modify the script files manually in
the Double-Take Availability installation location.
3. Click OK to save the settings.
If you are protecting Exchange, you can configure several settings for Active Directory.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Advanced tab.
Note: The fields on the Advanced tab will vary depending on the type of
application you are protecting. In addition, the fields will vary depending on
if you launched Application Manager in standard or advanced mode.
Note: If you want to add the target back to the PF list to which the source belongs,
you will need to enable the Restore PF Tree option.
a. From the main Application Manager screen, select Tools, Actions.
b. Enable Display Advanced Options.
c. Reselect Protect Exchange Server from the Tasks list in the left pane
and the Restore PF Tree option will be added to the Actions menu.
d. Select Actions, Restore PF Tree. This will copy the owning PF tree
setting from the source public folders to the target public folders.
If you are performing an identity failover, then you have already selected the Items to
Failover. Changing any of the Items to Failover on the Advanced tab will automatically
make the same change on the Failover tab Configure Identity Failover page.
However, if you are performing DNS failover, you may want to modify the items that you
are failing over using the instructions below.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Advanced tab.
Note: The fields on the Advanced tab will vary depending on the type of
application you are protecting. In addition, the fields will vary depending on
if you launched Application Manager in standard or advanced mode.
2. The default selected items under Items to Failover will depend on the application
you are protecting. Enable or disable if you want to failover the source's server
name, file shares, and/or Active Directory host name.
Note: If your source and target are on different subnets, you should not failover the
IP address.
File Server Note: You cannot failover file shares from a parent to child domain.
Several default connection options are available which allow you to disable or enable
the creation of default connection parameters. Ideally, you want Application Manager to
create the default parameters. However, if you have modified any of the parameters
manually and you do not want your modifications overwritten by the defaults, then you
may want to disable the creation of the default connection parameters.
1. Make sure you have a valid domain and servers specified, click Configure from
the main Application Manager page, and then select the Advanced tab.
Note: The fields on the Advanced tab will vary depending on the type of
application you are protecting. In addition, the fields will vary depending on
if you launched Application Manager in standard or advanced mode.
SharePoint Note: You also need to configure your hardware to allow communication
on port 6350.
Command
EFO
Description
Used in script files to failover Exchange data
Syntax
EXCHFAILOVER -FAILOVER | -FAILBACK -S <source> -T <target> [-L
<filename>] [-NORUS] [-NORM] [-NOSPN] [-NOOAB] [-
NOADREPLICATION] [-MAXREPWAIT <minutes>] [-NOEXCHANGEAB]
[-NOQUERYBASEDDISTGROUPS] [-NORGCONNECTORS] [-
NOPUBLICFOLDERS] [-ONLYPUBLICFOLDERS] [-MOVEHOSTSPN] [-
O <filename>] [-R [<source_group>] [,<source_mailstore>] [: [<target_
group>] [,<target_mailstore>] ] ] [-SETUP] [-TEST] [-U <name> :
<password>] [-VIRTUAL <new_IPaddress>] [-DC <domain_name> |
<IPaddress>] [-SDOMAIN] [-TDOMAIN] [/?] [/??]
Options
l FAILOVER—Exchange data will be moved from the source to the
target
l FAILBACK—Exchange data will be moved from the target to the
source. Even through the flow of data has changed (target to source),
the source-related options with this utility still pertain to your original
source (or a new source if you had to replace the source). The target-
related options pertain to the original target, the server that is currently
standing in for the source.
l S source—Name of the original source
l T target—Name of the original target
l L filename—Name of the log file. By default, the log file is
ExchFailover.log and is stored in the directory containing the
exchfailover.exe file. If this name is changed, the DTInfo utility will not
Note: If you enter the source server's fully-qualified domain name, the
Double-Take Console will resolve the entry to the server short name.
If that short name resides in two different domains, this could result in
name resolution issues. In this case, enter the IP address of the
server.
Note: If the size of the replica virtual machine is identical to the size of the
source volume and the source has less than 20 MB of free disk space
remaining, you may run out of disk space on the replica due to
differences in how the virtual disk's block size is formatted. To avoid
l Exclude these paths—If there are specific paths on a volume that you do
not want to protect, specify those locations. Keep in mind that missing data
may impact the integrity of your applications.
8. Click Next to continue.
9. Specify the target server. If you are protecting to a Hyper-V server, this is the name
of the Hyper-V server. If you are protecting to a ESX server, this is the host name of
your virtual recovery appliance.
l Server—Specify the name or IP address of the target server. You can click
Browse to select a server from a network drill-down list.
Note: If you enter the target server's fully-qualified domain name, the
Double-Take Console will resolve the entry to the server short name.
If that short name resides in two different domains, this could result in
name resolution issues. In this case, enter the IP address of the
server.
l Volume—Select one of the volumes from the list to indicate which volume on
the target where you want to store the new virtual server when it is created.
The target volume must have enough Free Space to store the source data.
The minimum size is noted at the bottom of the page.
l Use pre-existing virtual disks—You can reuse an existing virtual disk on
your ESX target, rather than having Double-Take Availabilitycreate a virtual
disk for you. This saves time by skipping the virtual disk creation steps and
performing a difference mirror instead of a full mirror. In order to use a pre-
existing virtual disk, it must be a valid VMware virtual disk. It cannot be
attached to any other virtual machine, and the virtual disk size cannot be
The fields on this screen will vary depending on if you are using an ESX target or a
Hyper-V target.
l Compress data at this level—Specify the level of compression that you
want to use for your transmissions from the source to the target. If
compression is enabled, the data is compressed before it is transmitted from
the source. When the target receives the compressed data, it decompresses
it and then writes it to disk.
Note: To achieve shorter delays before failover, use lower interval and
missed interval values. This may be necessary for servers, such as a
web server or order processing database, which must remain
available and responsive at all times. Lower values should be used
where redundant interfaces and high-speed, reliable network links are
available to prevent the false detection of failure. If the hardware does
not support reliable communications, lower values can lead to
premature failover. To achieve longer delays before failover, choose
higher values. This may be necessary for servers on slower networks
or on a server that is not transaction critical. For example, failover
would not be necessary in the case of a server restart.
Note: If you enter the source server's fully-qualified domain name, the
Double-Take Console will resolve the entry to the server short name.
If that short name resides in two different domains, this could result in
name resolution issues. In this case, enter the IP address of the
server.
8. Specify the Hyper-V target server where you will store the replica of the source
server.
l Volume—Select one of the volumes from the list to indicate which volume on
the target where you want to store the new virtual server when it is created.
The target volume must have enough Free Space to store the source data.
The minimum size is noted at the bottom of the page.
l Full path where the replica virtual machine will be stored—Specify a
location on the selected Volume to store the replica of the source. By
Note: To achieve shorter delays before failover, use lower interval and
missed interval values. This may be necessary for servers, such as a
web server or order processing database, which must remain
available and responsive at all times. Lower values should be used
where redundant interfaces and high-speed, reliable network links are
available to prevent the false detection of failure. If the hardware does
not support reliable communications, lower values can lead to
premature failover. To achieve longer delays before failover, choose
higher values. This may be necessary for servers on slower networks
or on a server that is not transaction critical. For example, failover
would not be necessary in the case of a server restart.
Note: The replica virtual path cannot contain any of the following special
characters.
#/\:*?'"<>|
By specifying a datastore and path with an existing virtual disk, you
can reuse an existing virtual machine created by a previous protection
job. This can be useful for pre-staging data on a virtual machine over
a LAN connection and then relocating it to a remote site after the initial
mirror is complete. When you reuse a virtual machine, Double-Take
Availability for VMware Infrastructure performs a difference mirror
which saves times. Use the following steps to reuse a virtual machine.
1. Verify the source has at least one active snapshot, thus unlocking
the .vmdk files allowing them to be copied.
2. Create a protection job, but delay the protection start time. Provide
a long enough delay to copy the .vmdk files from the source to the
target.
l Enter the display name—Specify the name for the replica virtual machine.
The name cannot contain any of the following special characters.
#/\:*?""<>|
Note: The target virtual machine is registered when replication is started and will
remain registered. To unregister a machine, you must click Delete
Protection and choose Delete the associated replica virtual machine.
Even though the target virtual machine appears to be available on the ESX
server, it should not be powered on, removed, or modified while it is owned
by an active protection job, otherwise the target virtual machine will become
corrupt and break the protection job.
Do not attempt to manually create or delete snapshots on the protected
virtual machine. This will disrupt the protection of the virtual machine and
1. From the Protection summary page, click Change in the Name section.
2. Specify a new name for the protection job.
3. Click Save.
1. From the Protection summary page, click Change in the Data transmission
section.
2. Specify any of the following data transmission options.
l Chose when to use compression—Specify the level of compression you
want to use. Compression reduces the amount of bandwidth needed to
transmit data from the source to the target. The data is compressed before
being transmitted and then is uncompressed before it is written on the target.
Typically, compression is used in WAN environments, but not in LAN
environments. If desired, enable compression and select the level of
compression that you want to use. All connections to the same target will
have the same compression settings.
l Transmit when the snapshot data reaches this size—Specify the size, in
MB, that will trigger when snapshots of the source are transmitted to the
target. When multiple virtual disks are used, any combination of writes across
all virtual disks that accumulate to the specified size will trigger transmission.
l Transmit data, regardless of snapshot size, after—Specify a length of
time that will trigger when snapshots of the source are transmitted to the
target. Transmission will occur regardless of the size of the snapshots.
Note: A snapshot transmission cycle will begin when either of the time or
size threshold conditions are met. During the snapshot transmission
cycle, the thresholds are not monitored. After the snapshot
transmission cycle has completed, the application will again monitor
the thresholds. If either of the thresholds were crossed during the
snapshot transmission cycle, a new transmission cycle will begin
immediately.
You may want to adjust the snapshot transmission options to optimize
performance in your environment. Some factors you need to consider
when adjusting these settings include the volume of write traffic in the
virtual machine, the allowed data loss time period, and the cost to the
virtual infrastructure.
1. From the Protection summary page, click Change in the E-mail notifications
section.
Note: In order to use e-mail notification, you may need to complete any or all of
the following on the Double-Take Availability for VMware Infrastructure
server.
l Disable anti-virus software
l Open port 25 in your anti-virus software to allow SMTP e-mail
l Enable outbound e-mail messages
l Exclude VI_Service.exe from blocked processes for sending outbound e-
mail messages.
2. If you have not yet configured an e-mail server, you will be prompted at the top of
the window. Click Configure.
3. Specify the e-mail notification settings.
l Recipients—Enter the e-mail addresses where the e-mail messages should
be sent. Separate the addresses with a comma, semi-colon, or carriage
return.
l Notifications—Select the event categories that you want to be notified
about. If there are no event categories selected, there will be no e-mail
notifications.
4. Click Test E-mail Settings to verify your e-mail configuration.
Note: The following error message indicates anti-virus software on the server may
be blocking outbound e-mail messages.
Failure sending mail. Unable to connect to the remote server.
An established connection was aborted by the software in your
host machine.
5. Click Save.
1. If you configured VirtualCenter servers when you established protection, you can
select Change in the VirtualCenters section on the Protection Summary page.
2. Modify the User name and Password associated with either the source or target
VirtualCenter server. The changes will be applied to this protection job only.
3. Click Save.
1. From the Protection summary page, click Change in the Restart and
thresholds section.
2. Specify any of the following options.
l Restart this protection automatically if there is a problem—This option
specifies if Double-Take Availability for VMware Infrastructure will attempt to
restart the protection job if there is a problem. If you enable this option,
specify the Number of times to attempt to restart.
l Disk space remaining—Specify the amount of space remaining, either by
percentage or by size in MB, to trigger stopping the protection.
3. Click Save.
Note: The default number of files that are listed in the right pane of the
Replication Console is 2500, but this is user configurable. A larger
number of file listings allows you to see more files in the Replication
Console, but results in a slower display rate. A smaller number of file
listings displays faster, but may not show all files contained in the
directory. To change the number of files displayed, select File,
Options and adjust the File Listings slider bar to the desired number.
To hide offline files, such as those generated by snapshot
applications, select File, Options and disable Display Offline Files.
Offline files and folders are denoted by the arrow over the lower left
corner of the folder or file icon.
e. Identify the data on the source associated with the group that you want to
protect by selecting volumes, drives, directories, and/or specific files. Be sure
and verify what files can be included in your replication set.
Note: As an alternative to the following manual steps, you can stop the Double-
Take service on the other nodes of the source cluster, copy the file
DblTake.db from the first node to the other nodes, and then restart the
Double-Take service.
a. Right-click the replication set created on the owning node and select
Properties.
Note: Each replication set rule on the non-owning nodes must be identical
to the replication set rule on the owning node.
h. After entering all of the replication set rules, save the replication set. The
replication set rules will be saved even though the non-owning nodes do not
have access to the locations right now. The rules will function properly when
the node becomes an owner.
l Full Mirror—All files in the replication set will be sent from the source to the
target.
Note: If you are using a database application, do not use the newer option
unless you know for certain you need it. With database applications, it
is critical that all files, not just some of them that might be newer, get
mirrored.
l Full Mirror—All files in the replication set will be sent from the source to the
target.
l File differences—Only those files that are different based size or date and
time will be sent from the source to the target.
l Send data only if Source is newer than Target—Only those files that are
newer on the source are sent to the target.
Note: If you are using a database application, do not use the newer option
unless you know for certain you need it. With database applications, it
is critical that all files, not just some of them that might be newer, get
mirrored.
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
Note: If you are using Hyper-V, select the drive where the virtual
machine .vhd file is stored.
Note: If the GeoCluster Replicated Disk Resource is offline, data integrity cannot be
guaranteed on the other nodes in the cluster.
There are six properties tabs for the GeoCluster Replicated Disk resource on Windows
2003.
1. General—This tab identifies the Name and Description of the resource and the
Possible Owners. If you change the name of the resource, the replication set
name will not change until the next time the resource is brought online. The
GeoCluster Replicated Disk resource must have at least two possible owners to
function properly. Modifying the Possible Owners list will cause one of the
following actions to occur.
l If you add additional Possible Owners, the GeoCluster Replicated Disk
resource will connect the resource’s replication set to the new owners and
begin a mirror to each.
l If you remove Possible Owners, the GeoCluster Replicated Disk resource
will disconnect the resource’s replication set from each owner removed.
2. Dependencies—By default, the GeoCluster Replicated Disk resource is not
dependent on any other resources.
3. Advanced settings—This tab controls how and when MSCS handles a failure of
the resource.
l Do not restart—Select this option if you do not want cluster service to restart
the resource if it fails.
l Restart—Select this option if you want cluster service to restart the resource
if it fails.
l Enable Affect the group if you want a failure of this resource to move
the group to another node. If you disable this option, cluster service still
attempts to restart the resource using the Threshold and Period
values, but the failure of the resource will not cause the group to move
to another node.
l The Threshold and Period values determine the number of times
cluster service will attempt to restart the failed resource within a
specified period of time before moving the group to another node.
l "Looks Alive" poll interval—This setting specifies how often the resource is
polled to determine whether it is still running on the active node. You can
choose a value from the resource type, or you can specify your own value.
l "Is Alive" poll interval—This setting designates how often the possible
owners are polled to determine whether the specified disk on each node can
be written to and read from. You can choose a value from the resource type,
or you can specify your own value.
l Pending timeout—This value determines how long the resource is allowed
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
There are eight properties tabs for the GeoCluster Replicated Disk resource on
Windows 2008.
1. General—This tab identifies the Name and Resource type of the resource. It also
displays the current state of the resource and an additional detailed status
message.
2. Dependencies—By default, the GeoCluster Replicated Disk resource is not
dependent on any other resources.
3. Policies—This tab controls how and when MSCS handles a failure of the
resource. For more information on Policies options, see your Windows
documentation.
l If resource fails, do no restart—Select this option if you do not want cluster
service to restart the resource if it fails.
l If resource fails, attempt restart on current node—Select this option if you
want cluster service to restart the resource if it fails. Specify the length of time
to attempt restarts and the number of restarts to attempt during that period of
time.
l If restart is unsuccessful, fail over all resources in this service or
application—If this option is enabled, the failure of the group will cause the
resource to move to another node. If this option is disabled, the failure of the
resource will not cause the resource to move to another node.
l If all the restart attempts fail, begin restarting again after the specified
period—If this option is enabled, the cluster will delay the length of time
specified before trying to restart the resource again.
l Pending timeout—This value determines how long the resource is allowed
to remain in a pending state before it fails. If the resource takes longer than
the time specified to be brought online or taken offline, the resource fails.
4. Advanced Policies—This tab controls resource specific settings. For more
information on Advanced Policies options, see your Windows documentation.
l Possible owners—All nodes of the cluster are listed. Select or deselect the
nodes that you want to be possible owners.
l If you add additional owners, the GeoCluster Replicated Disk resource
will connect the resource’s replication set to the new owners and begin
a mirror to each.
l If you remove owners, the GeoCluster Replicated Disk resource will
disconnect the resource’s replication set from each owner removed.
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
You would add the following to your failback script to register the source’s name back
with the source’s original IP address on the two secondary WINS servers.
See your Windows documentation or the Microsoft web site for more details on the
NETSH command.
You would add the same line to your failback script to force the target’s primary WINS
server to replicate its updated information again. This would replicate information for the
source’s name and the source’s original IP address to the other secondary WINS
servers on the network.
See your Windows documentation or the Microsoft web site for more details on the
NETSH command.
You would add the following to your failback script to delete the host and reverse lookup
entries and add new entries associating the source with its original identity.
See your Windows documentation or the Microsoft web site for more details on the
DNSCMD command.
Command
DFO
Description
Used in scripts to failover DNS server name
Syntax
DFO [/DNSSRVNAME <dns_server_name>] /SRCNAME
<source_fqd_name> /SRCIP <source_ip> /TARIP <target_ip>
/TARNAME <target_fqd_name> [/RECORDTYPE <rec_type>]
[/USERNAME <user_name> /PASSWORD <password>]
[/DNSZONE <zone_name>] [/DNSDOMAIN <domain_name>]
[/LOGFILE <file_name>] /FAILBACK [fb_switch]
[/SETPASSWORD <user_name> <password>[machine][file]]
[/GETPASSWORD] [/LOCK] [/UNLOCK] /TRUSTEE <trustee_
name> [/VERBOSE] [/FLUSHDNS /MACHINE <machine_fqd_
name>] [/TTL <seconds>] [/ADDOMAIN <active_directory_
domain_name> [/SOURCEDN <source_domain_name> [/TEST]
[/DEBUG] [/HELP]
Options
l DNSSRVNAME dns_server_name—The name of the source
domain/zone's primary DNS server. If not specified, the local
machine will be used.
l SRCNAME source_fqd_name—The source machine's fully
qualified domain name
l SRCIP source_ip—The source machine's IP address
l TARIP target_ip—The target machine's IP address
l TARNAME target_fqd_name—The target machine's fully
qualified domain name (required only for failback)
l RECORDTYPE rec_type—The type of DNS resource records to
modify or list. Values record types are ALL, MSEXCHANGE, A,
CNAME, MX, PTR, STD, or STANDARD. STD and STANDARD
are used to specify a non-Exchange record (minus the MX
records). By default, all record types are included.
l USERNAME user_name—The domain name of the user
account. If not specified, the account running the utility will be
used.
nsupdate.exe "c:\install_location\dnsover.txt"
nsupdate.exe "c:\install_location\dnsback.txt"
Note: You can automate the creation of the volumes during the failover
process by using the macfile volume command in the post-failover
batch file. For detailed information on how to use this command, see
your Windows reference guide.
3. On the target machine, copy the chngname utility, chngname.exe, from the
\tools\Win2K directory of the Double-Take Availability CD or from the Double-Take
Software support web site to the directory where Double-Take Availability is
installed.
4. Add the following to your failover script.
In the event of a failure, the Macintosh clients must remap the volume in order to access
it. From the Macintosh client, use the Chooser to select the volume that needs to be
remapped.
In the event of a failure, the clients must remount the shares in order to access them.
Replication Set
Replication set indicates the name of the connected replication set.
Connection ID
The connection ID is the incremental counter used to number each
connection established. This number is reset to one each time the Double-
Take service is restarted.
Target Name
The name of the target as it appears in the server tree in the left pane of
the Replication Console. If the server’s name is not in the server tree, the
IP address will be displayed.
Target IP
The target IP is the IP address on the target machine where the mirroring
and replication data is being transmitted.
Note: If the Site Monitor and Connection Monitor settings are different, at times,
the icons and color may not be synchronized between the left and right
panes.
—An icon with yellow and blue servers indicates a server that is working
properly.
—A yellow folder with a blue server indicates a group folder that is working
properly.
—A black exclamation point inside a yellow triangle on a group folder indicates
there is a communication error on one of the servers in the group. Drill down
through the group until you find the server that has the communication error.
—A white X inside a red circle on a group folder indicates there is a connection
error on one of the servers in the group. Drill down through the group until you find
the server that has the connection error.
The following icons and colors are displayed in the right pane when a server is
highlighted in the left pane.
The following icons are displayed in the right pane when a group is highlighted in
the left pane.
—An icon with a network cable between two servers on the right pane
indicates there are no established Double-Take Availability connections to this
server. This icon also indicates that communications between the Replication
Console and the server are working properly.
—An icon with two servers on the right pane indicates this server has active
connections that are working properly.
—A yellow server icon with a red X on the right pane indicates a connection
error. For example, an error may be caused by broken transmission or pending
replication. To determine the exact problem, locate the connection data item that
appears in red.
—An icon with a network cable between two servers and marked with a red
X on the right pane indicates a communication error between the Replication
Console and the server.
—A network cable with a black X indicates the server is not running Double-
Take Availability.
Note: You can minimize the Failover Control Center and, although it will not appear in
your Windows taskbar, it will still be active and the failover icon will still appear in
the desktop icon tray.
The following table identifies how the visual indicators change when the source is
online.
The following table identifies how the visual indicators change when the source fails and
failover is initiated.
The following table identifies how the visual indicators change when failover is
complete.
l Disabled—Protection for the source has not been started. The target must be
validated as compatible before you can enable protection.
l Initializing—Double-Take Availability is initializing protection. Once initialization is
complete, mirroring will automatically begin.
l Mirroring (% complete)—Double-Take Availability is mirroring the source’s data
and system state to the target. The percentage indicates how much of the mirror
has been completed. Protection is not complete until the mirror has completed.
l Mirroring (Retrying)—You may see this status message if the target is out of disk
space or if Double-Take Availability cannot write to a file on the target. Check the
log file on the target for more information.
l Mirroring (Mirror stopped)—You may see this status message if your mirroring
process has stopped. Depending on the reason for the stopped mirror, it may
restart automatically. Check your Double-Take Availability log file.
l Mirroring (Source Unavailable)—You may see this status message if the source
has become unavailable during your mirroring process. You cannot failover until
the mirroring process is complete. Correct the issues causing the unavailability,
and mirroring will restart automatically.
l Mirroring (Op Dropped)—You may see this status message if the target server
cannot apply data to disk. For example, a file may be in use on the target. Check
the Double-Take Availability log file on the target for more details.
l Enabled—The mirroring is complete and protection of the source is enabled. In the
event the source should fail, the target will be able to stand-in for it.
l Enabled (Source Unavailable)—You may see this message when the target has
lost communication with the source. If communication is reestablished before the
failover monitoring time expires, the status will update to Enabled. If
communication is not reestablished before the failover monitoring time expires, the
status will update to Failover condition met.
l Failover condition met—The target has missed too many responses from the
source, indicating that the source has failed. At this time, you need to manually
Protection Status
l Unprotected—No connection exists
l Warning—A connection exists but has issues
l Protected—A connection exists and is active
l Synchronizing—Mirroring is in progress
l Unknown—The protection status could not be determined
l Failing over—Failover from the source to the target is in progress
l Failed over—Failover is complete and the target has assumed the
source role
l Failing back—Failback from the target to the original source is in
progress
l Restoring—Mirroring (target to source) is in progress
Monitoring Status
l Disabled—Monitoring is disabled
l Enabled—Monitoring is active
l Failover condition met—The source server is unavailable
l Failing over—Failover from the source to the target is in progress
l Failed over—Failover is complete and the target has assumed the
source role
l Failing back—Failback from the target to the original source is in
progress
Mirror Status
l Calculating—The amount of data to be mirrored is being calculated
l Idle—Data is not being mirrored to the target machine
l Mirroring—Data is being mirrored to the target machine
l Paused—Mirroring has been paused
l Removing Orphans—Double-Take Availability is checking for orphan
files within the target path location (files that exist on the target but not
on the source). These files will be removed.
l Verifying—Data is being verified
Column 1 (Blank)
The first blank column indicates the state of the connection.
Name
The name of the server
Activity
There are many different Activity messages that keep you informed of the
connection activity. Most of the activity messages are informational and do
not require any administrator interaction. If you see error messages, check
the connection details.
Source server
The name of the source
Target server
The name of the target
Bytes sent
The total number of mirror and replication bytes that have been transmitted
to the target
Bytes sent compressed
The total number of compressed mirror and replication bytes that have
been transmitted to the target. If compression is disabled, this statistic will
be the same as Bytes sent.
Connected since
The date and time indicating when the current connection was made. This
field is blank, indicating that a TCP/IP socket is not present, when the
connection is waiting on transmit options or if the transmission has been
stopped. This field will maintain the date and time, indicating that a
TCP/IP socket is present, when transmission has been paused.
Protection type
The type of workload protection
Hypervisor
The type of target virtual server host
Configure
Opens the Protection Summary page
Delete
Removes configuration information for the selected protection
If you no longer want to protect the source and no longer need the replica
of the source on the target, select the appropriate delete option when
prompted. The option name will vary depending on your workload type.
Selecting this option will remove the connection and completely delete the
replica virtual machine on the target.
If you no longer want to mirror and replicate data from the source to the
target but still want to keep the replica of the source on the target, select
the appropriate keep option when prompted. The option name will vary
depending on the your workload type. For example, you may want to use
this option to relocate the virtual hard disks and create a new job between
the original source and the new location. Selecting this option, will
preserve and register the source replica on the target, provided it has been
fully synchronized. If the source replica is not fully synchronized, related
files will be kept on the target but will not be registered.
Start protection
Enables protection for the selected protection
If you have previously stopped protection, the virtual hard disks on the
target will be checked. If they are the same as the source, replication only
(no mirroring) will begin. If they are not the same but there is a file on the
target, a difference mirror will begin.
If you have previously paused protection, the protection job will resume
where it left off.
Pause protection
Pause the selected protection
Failover
Initiate failover by shutting down the source and starting the replica of the
source on the target
Undo Failover
For some workload types, you can undo failover after it has occurred. This
resets the servers and the job back to their original state.
Reverse protection
For some workload types, you can reverse the protection. The connection
will start mirroring in the reverse direction with the connection name and
log file names changing accordingly. After the mirror is complete, the job
will continue running in the opposite direction.
Connection name
The name of the connection
Description
The connection status
Health
Name
The name of the connection
Status
A description of the current status of the protection
Bytes Pending
The remaining amount of data (.vmdk files plus snapshot files) that needs
to be transmitted
Remaining Interval
The amount of time until the next replication cycle
—Opens the Protection Summary page allowing you to modify some protection
settings.
—Deletes the selected protection. You will be prompted to keep or delete the
associated replica virtual machine on the target. If you do not need the replica on the
target, you can delete it. However, if you want to keep the replica on the target, for
example, if you want to being using the replica on the target as the production server,
you can keep the replica. In this case, the replica will be preserved and registered (as
long as the initial mirror has completed) allowing the virtual machine to be available in
VirtualCenter. If the initial mirror has not completed, the files will be available on the
target ESX server but will not be registered.
—Starts protection
—Stops protection
—Initiates failover by stopping the virtual machine on the source and starting the
replica virtual machine on the target
—Initiate reverse protection by mirroring and replicating from the replica virtual
machine on the target to the virtual machine on the source
—Initiate undo failover to reset the virtual machines and the protection job back to
the original state
Close
Closes the message window
Clear
Clears the message window
Pause/Resume
Pauses and resumes the message window.
Pausing prevents new messages from being displayed in the
message window so that you are not returned to the bottom of
the message window every time a new message arrives. The
messages that occur while the window is logged are still
logged to the Double-Take Availability log file.
Resuming displays the messages that were held while the
window was paused and continues to display any new
messages.
Pausing is automatically initiated if you scroll up in the
message window. The display of new log messages will
automatically resume when you scroll back to the bottom.
Copy
Allows you to copy selected text
Options
This control is only available from the Monitor menu.
Currently, there are no filter options available so this option
only allows you to select a different server. In the future, this
control will allow you to filter which messages to display.
Command
LOGVIEWER
Description
The Double-Take Availability logging utility that filtersDouble-Take
Availability log files
Syntax
LOGVIEWER [-PATH <path>] [-TYPE <number>] [-INCLUDE <list>] [-
EXCLUDE <list>] [-NODATE] [-NOTIME] [-NOPID] [-NOTID] [-NOSEQ] [-
NOTYPE] [-NOID] [-HELP]
Options
l PATH path—Specify the full path to the log file
l TYPE number—Allows you to filter the messages that are displayed.
Specify 1 to display warning and error messages or specify 2 to display
warnings, errors, and notifications
l INCLUDE—Only includes specified IDs. All other IDs will not be
displayed in the output
l EXCLUDE—Excludes specified IDs. Ignore the specified IDs and
display all others
l list—A comma-separated list of IDs or ID ranges that follows the
INCLUDE and EXCLUDE switches. A space should separate the
switch from the list but within the list, there should be no spaces.
Ranges are specified with a begin and end number and separated with
a dash (-).
l NODATE—Does not display the date in the output
l NOTIME—Does not display the time in the output
l NOPID—Does not display the process ID in the output
l NOTID—Does not display the thread ID in the output
l NOSEQ—Does not display the sequence number in the output
l NOTYPE—Does not display the message type number in the output
Note: If you change the Maximum Length or Maximum Files, you must
restart the Double-Take service for the change to take effect.
Note: In this information, con_id refers to the unique connection ID assigned to each
connection between a source replication set and a target.
There are several log messages with the ID of 0. See the description in the
Message column in the log file.
Note: For additional information on customizing the Event Viewer (such as sorting
the display, filtering the display, and so on), see your Windows reference
guide or the Windows online help.
1 This evaluation period has expired. Mirroring and replication have been stopped.
To obtain a license, please contact your vendor.
Error—Contact your vendor to purchase either a single or site license.
2 The evaluation period expires in %1 day(s).
Information—Contact your vendor before the evaluation period expires to
purchase either a single or site license.
3 The evaluation period has been activated and expires in %1 day(s).
Information—Contact your vendor before the evaluation period expires to
purchase either a single or site license.
4 Duplicate activation codes detected on machine %1 from machine %2.
Warning—If you have an evaluation license or a site license, no action is
necessary. If you have a single license, you must purchase either another
single license or a site license.
5 This product edition can only be run on Windows Server or Advanced Server
running the Server Appliance Kit.
Error—Verify your activation code has been entered correctly and contact
technical support.
1000 An exception occurred: %1
Error—Run the installation and select Repair. Contact technical support if
this event occurs again.
1001 The Double-Take counter DLL could not initialize the statistics handler object
to gather performance data.
Error—Run the installation and select Repair. Contact technical support if
this event occurs again.
1002 The Double-Take counter DLL could not map shared memory file containing
the performance data.
Error—Run the installation and select Repair. Contact technical support if
this event occurs again.
Note: You can test e-mail notification by specifying the options on the E-mail
Notification tab and clicking Test. (By default, the test will be run from
the machine where the Replication Console is running.) If desired,
you can send the test message to a different e-mail address by
selecting Send To and entering a comma or semicolon separated list
of addresses. Modify the message text up to 1024 characters, if
necessary. Click Send to test the e-mail notification. The results will
be displayed in a message box. Click OK to close the message and
click Close to return to the E-mail Notification tab.
E-mail notification will not function properly if the Event logs are full.
If an error occurs while sending an e-mail, a message will be
generated. This message will not trigger an e-mail. Subsequent e-
mail errors will not generate additional messages. When an e-mail is
sent successfully, a message will then be generated. If another e-mail
fails, one message will again be generated. This is a cyclical process
where one message will be generated for each group of failed e-mail
messages, one for each group of successful e-mail messages, one for
the next group of failed messages, and so on.
If you start and then immediately stop the Double-Take service, you
may not get e-mail notifications for the log entries that occur during
startup.
By default, most virus scan software blocks unknown processes from
sending traffic on port 25. You need to modify the blocking rule so that
Double-Take Availability e-mail messages are not blocked.
=================================
0/11/10 12:48:05:2040
=================================
SYSTEMALLOCATOR::Total Bytes: 0
IQALLOCATOR::Total Bytes: 0
SECURITY::Logins : 1 FailedLogins : 0
KERNEL::SourceState: 2 TargetState: 1 Start Time: Tue Sep 11 12:45:26 2007
RepOpsGenerated: 436845 RepBytesGenerated: 0
MirOpsGenerated: 3316423 MirBytesGenerated: 108352749214952
FailedMirrorCount: 0 FailedRepCount: 0
ActFailCount: 0 TargetOpenHandles: 0 DriverQueuePercent: 0
TARGET:: PeerAddress: 10.10.1.104 LocalAddress: 10.10.1.104
Ops Received: 25 Mirror Ops Received: 23
Retries: 0 OpsDropped: 0 Ops Remaining: 0
Orphan Files Removed: 0 Orphan Directories Removed: 0 Orphan Bytes
Removed: 0
Bytes In Target Queue: 0 Bytes In Target Disk Queue: 0
TasksSucceeded: 0 TasksFailed: 0 TasksIgnored: 0
SOURCE::autoDisConnects : 0 autoReConnects : 1
lastFileTouched : /log/data_file
CONNECTION:: conPeerAddress: 10.10.1.104
connectTime: Tue Sep 11 12:45:34 2007
conState: 1 conOpsInCmdQueue: 0 conOpsInAckQueue: 0
conOpsInRepQueue: 0 conOpsInMirQueue: 0 conBytesInRepQueue: 0
conOpsTx: 27 conBytesInMirQueue: 0 conBytesTx: 14952687269
conBytesCompressedTx: 14952
conOpsRx: 201127 conBytesRx: 647062280 conResentOpCount: 0
conBytesInDiskQueue: 0
conBandwidthLimit: 429496295 conBytesSkipped: 22867624
conMirrorBytesRemain: 0
conMirrorPercent: 100.0%
conTaskCmdsSubmitted: 0 conTaskCmdsQueued: 0
conTasksSucceeded: 0 conTasksFailed: 0 conTasksIgnored: 0
3. At the top of the tab, specify the Folder where the log files for messages, alerts,
verification, and statistics will be saved.
4. Under Statistics, specify the following information.
l Filename—The name of the statistics log file. The default file name is
statistic.sts.
l Maximum Length—The maximum length of the statistics log file. The default
maximum length is 10 MB. Once this maximum has been reached, Double-
Take Availability begins overwriting the oldest data in the file.
Command
DTSTAT
Description
Starts the DTStats statistics logging utility from a command prompt
Syntax
DTSTAT [-p][-i <interval>][-t <filename>] [-f <filename>] [-s <filename>] [-
st <filename>][-IP <address>] [-START <mm/dd/yyyy hh:mm>][-STOP
<mm/dd/yyyy hh:mm>] [-SERVER <ip_address> <port_number>]
Options
l -p—Do not print the output to the screen
l -i interval—Refresh from shared memory every interval seconds
l -t filename—Save the data from memory to the specified binary file
filename
l -f filename—Reads from a previously saved binary file, filename, that
was generated using the -t option instead of reading from memory
l -s filename—Saves only the connection data from the data in memory
to an ASCII, comma-delimited file, filename
l -st filename—Saves only the target data from the data in memory to an
ASCII, comma-delimited file, filename
l -f filename1 -s filename2—Saves only the connection data from a
previously saved binary file, filename1, to an ASCII, comma-delimited
file, filename2
l -f filename1 -st filename2—Saves only the target data from a
previously saved binary file, filename1, to an ASCII, comma-delimited
file, filename2
l -IP address—Filters out the specified address in the IP address field
and prints only those entries. Specify more than one IP address by
separating them by a comma.
l -START mm/dd/yyyy hh:mm—Filters out any data prior to the
specified date and time
Note: The categories you see will depend on the function of your server (source, target,
or both).
If you have multiple IP addresses connected to one target server, you will see
multiple Target sections for each IP address.
If you convert your statistics output to an ASCII, comma-delimited file using the
dtstat -s option, keep in mind the following differences.
l The statistic labels will be slightly different in the ASCII file than in the
following table.
l The statistics will appear in a different order in the ASCII file than in the
following table.
l The statistics in the Target Category in the following table are not included in
the ASCII file.
l The Kernel statistic Target Open Handles is not included in the ASCII file.
l The ASCII file contains a Managed Pagefile Alloc statistic which is no longer
used.
Date/Time Stamp
The date and time that the snapshot was taken. This is the date and time
that each statistic was logged. By default, these are generated once a
second, as long as there are statistics being generated. If
mirroring/replication is idle, then DTStat will be idle as well.
System Allocator, Total Bytes
The number of bytes currently allocated to the system pagefile
IQAllocator, Total Bytes
The number of bytes currently allocated to the intermediate queue
Security, Logins
The number of successful login attempts
Security, Failed Logins
The number of failed login attempts
Note: If you have multiple IP addresses connected to one target server, you will see
multiple Target statistic sections for each IP address.
Kernel, dttrapKernelStarted
Double-Take Availability has started
Kernel, dttrapKernelStopped
Double-Take Availability has stopped
License, dttrapLicenseViolationStartingSource
The source cannot be started due to a license violation
License, dttrapLicenseViolationOnNetwork
A Double-Take Availability serial number conflict was identified on the
network
Source, dttrapSourceStarted
Double-Take Availability source component has started
Source, dttrapSourceStopped
Double-Take Availability source component has stopped
Target, dttrapTargetStarted
Double-Take Availability target component has started
Target, dttrapTargetStopped
Double-Take Availability target component has stopped
Connection, dttrapConnectionRequested
The source has requested a connection to the target
Connection, dttrapConnectionRequestReceived
The target has received a connection request from the source
Connection, dttrapConnectionSucceeded
The source to target connection has been established
Connection, dttrapConnectionPause
The source to target connection has paused
General, dtUpTime
Time in seconds since Double-Take Availability was last started
General, dtCurrentMemoryUsage
Amount of memory allocated from the Double-Take Availability memory
pool
General, dtMirOpsGenerated
The number of mirror operations (create, modify, or delete) that have been
transmitted by the mirroring process
General, dtMirBytesGenerated
The number of bytes that have been transmitted by the mirroring process
General, dtRepOpsGenerated
The number of operations (create, modify, or delete) that have been
transmitted by the replication process
General, dtRepBytesGenerated
The number of bytes that have been transmitted by the replication process
General, dtFailedMirrorCount
The number of operations that failed to mirror because they could not be
read on the source
General, dtFailedRepCount
The number of operations that failed to be replicated because they could
not be read on the source
General, dtActFailCount
The number of activation code errors
General, dtAutoDisCount
The number of auto-disconnects
General, dtAutoReCount
The number of auto-reconnects
-1 Unknown error code (generated when a command failed but the failure is not linked to
a pre-defined error code)
-101 Invalid parameter was supplied
-102 Command is not a valid or the syntax is incorrect
-103 Double-Take Availability source module is not loaded
-104 No Double-Take Availability source identified
-105 Double-Take Availability target module is not loaded
-106 Connection already established
-107 Connection does not exist
-108 Mirror currently active
-109 Server does not exist or could not be located
-110 Server is not responding
-111 Double-Take Availability is running
-112 Unknown connection error
-113 Mirror already active
-114 Date is invalid - valid format is mm/dd/yy
-115 Time is invalid - valid format is hh:mm
-116 Invalid option supplied
-117 Mirror is not paused
-118 Connection is not paused
-119 Connection does not exist
-120 Connection already connected
-121 Mirror is not running
-122 Replication set exists
-123 Replication set does not exist
-124 No replication set has been selected
Note: If the Failover Control Center is not running at the time the failure occurs, the
manual intervention dialog box will appear the next time the Failover Control
Center is started.
When a failure occurs, an alert is forwarded to the Windows event log. You can
then start the Failover Control Center and respond to the manual intervention
prompt.
If SNMP is installed and configured, an SNMP trap is also generated. When
using a third-party SNMP manager, an e-mail or page can be generated to notify
you of the failure.
You will be prompted to specify what data you want to use on the target.
Select an option based on the table below. You may want to check the amount of data in
queue on the target by reviewing the Statistics or Performance Monitor.
After failover is complete, clients will be rerouted to the target, which is standing in for the
source.
Exchange Note: Users using Outlook or Outlook Web Access to receive e-mail can
connect after the changes have propagated through your
environment. Users that had Outlook open during failover will need to
restart the Outlook client (excluding Outlook Web Access clients on a
LAN). Additionally, those users using Outlook Web Access or
Outlook 2007 may see a security alert because the security certificate
has the source server name but Exchange is now on the target. Click
Allow or OK to dismiss the alert.
SQL Note: After failover, linked databases in the SQL instance will be
unavailable until the service master key is updated. You will need to
run the command "alter service master key force regenerate" against
the SQL target server to reset the service master key and then
remove and re-add the linked servers into the target SQL instance.
After failover with a snapshot of a SQL database-only server, the SQL
services on the target server are stopped and the databases are not
mounted. You will need to manually start the MSSQLServer service
for each instance on the target server and then manually attach the
databases.
After failing over SQL 2008, Rich Internet Applications created using
ADO.net 2 may not connect.
After failing over SQL 2008, you may not be able to take the SQL
database offline. If this occurs, stop and restart the SQL Server
Management Studio application, and then you can take the database
offline.
After failing over in a SQL workgroup, you will not be able to connect
to the source server instance of SQL. You can work around this issue
by creating an alias on the target with the source server’s name.
BlackBerry Note: There is a potential to lose BlackBerry instant messages and instant
message contacts when an Exchange mailbox is moved, depending
on the type of BlackBerry hand-held device. You should back up
Note: If you are failing over a cluster node, it is possible that volumes may lose their
drive letter assignments. If a clustered application fails to start after failover and
the disk signature has changed, check the drive letter assignments under the
Disk Management utility and re-create drive letter assignments as needed.
Because the Windows product activation is dependent on hardware, you may
need to reactivate your Windows registration after failover. In most cases when
you are using Windows 2003, you can follow the on-screen prompts to complete
the reactivation. However, when you are using Windows 2008, the reactivation
depends on your licensing type. If a Windows 2008 target comes online after
failover with an activation failure, use the steps appropriate for your license type.
l Retail licensing—Retail licensing allows the activation of a single operating
system installation.
1. Open the System applet in Windows Control Panel.
2. Under Windows activation at the bottom of the page, click Change
product key.
3. Enter your retail license key. You may need access to the Internet or to
call Microsoft to complete the activation.
l MAK volume licensing—Multiple Activation Key (MAK) licensing allows the
activation of multiple operating system installations using the same activation
key.
1. View or download the Microsoft Volume Activation Deployment Guide
from the Microsoft web site.
Command
FFMANAGER
Description
Initiates the Full-Server Failover Manager user interface, passes through
specified parameters, and initiates specified processes
Syntax
FFMANAGER /SOURCE source_name /TARGET target_
name/USERNAME username /PASSWORD password /VALIDATE
/FIXALL /PROTECT /FAILOVER /LOGLEVEL number /CONFIG
filename
Options
l SOURCE source_name—Name of the source
l TARGET target_name—Name of the target
l USERNAME username—Name of a user who is a member of the
Double-Take Admin security group
l PASSWORD password—Password associated with the specified user
Note: In a clustered environment where the source suddenly becomes unavailable (for
example, it crashes) and the Application Manager is open, it may appear to be
unresponsive for up to 30 minutes before the failover process continues. The
Application Manager is waiting on a Microsoft cluster file to respond. To reduce
the amount of time before failover can continue, close and re-open the
Application Manager.
If you are protecting a file server, failover is only available if the source is offline,
in order to prevent name conflicts on the network.
Exchange Note: Users using Outlook or Outlook Web Access to receive e-mail can
connect after the changes have propagated through your
environment. Users that had Outlook open during failover will need to
restart the Outlook client (excluding Outlook Web Access clients on a
LAN). Additionally, those users using Outlook Web Access or
Outlook 2007 may see a security alert because the security certificate
has the source server name but Exchange is now on the target. Click
Allow or OK to dismiss the alert.
SQL Note: After failover, linked databases in the SQL instance will be
unavailable until the service master key is updated. You will need to
run the command "alter service master key force regenerate" against
the SQL target server to reset the service master key and then
remove and re-add the linked servers into the target SQL instance.
After failover with a snapshot of a SQL database-only server, the SQL
services on the target server are stopped and the databases are not
mounted. You will need to manually start the MSSQLServer service
for each instance on the target server and then manually attach the
databases.
After failing over SQL 2008, Rich Internet Applications created using
ADO.net 2 may not connect.
After failing over SQL 2008, you may not be able to take the SQL
database offline. If this occurs, stop and restart the SQL Server
Management Studio application, and then you can take the database
offline.
After failing over in a SQL workgroup, you will not be able to connect
to the source server instance of SQL. You can work around this issue
by creating an alias on the target with the source server’s name.
BlackBerry Note: There is a potential to lose BlackBerry instant messages and instant
message contacts when an Exchange mailbox is moved, depending
on the type of BlackBerry hand-held device. You should back up
Note: Once failover has occurred, if you add CPUs to the replica of the source on
the target, you may have to reboot the replica before the operating system
will recognize the additional CPUs.
5. After failover is complete, you can undo it by clicking Undo Failover in the toolbar.
The replica virtual machine on the target will be shutdown, the source virtual
machine will be restarted (in the case of live failover), and protection will be
restarted performing a file differences remirror. All changes made on the replica
virtual machine on the target will be lost. If you do not want to lose changes made
replica virtual machine on the target, perform a restore and failback.
b. Identify the Original Source machine. This is your source machine where
the data originally resided.
c. Select the Restore From machine. This is the target machine where the
copy of the data is stored.
Note: If your target is a cluster, you can specify just one node in the cluster
and restore only from that node. If you need to have the cluster
d. Replication Set contains the replication set information stored on the target
machine (the machine in Restore From). If no replication sets are available,
the list will be blank. Select the replication set that corresponds to the data
that you need to restore.
e. Select the Restore To machine. This is your temporary source that has the
unique IP address.
f. The Restore To and Restore From paths will automatically be populated
when the replication set is selected. The restore to path is the directory that is
the common parent directory for all of the directories in the replication set. If
the replication set crosses volumes, then there will be a separate path for
each volume. The restore from path is the path on the target server where the
replicated files are located.
Note: Restoring across a NAT router requires the ports to be the same as
the original connection. If the ports have been modified (manually or
reinstalled), you must set the port numbers to the same values as the
last valid source/target connection.
g. Select the Use Backup Replication Set check box to use the target’s copy
of the replication set database for the restoration. If this check box is not
marked, you will be accessing the replication set information from the source.
h. Select the Restore Replication Set check box to restore the target’s copy of
the replication set database to the source during the restoration process.
i. Select the restoration conditionals that you want to use.
l Overwrite existing files during restore—This option restores all
existing files by overwriting them. Any files that do not exist on the
source are written also. If this option is disabled, only files that do not
exist on the source will be restored.
l Only if backup copy is more recent—This option restores only those
files that are newer on the target than on the source. The entire file is
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
Note: If the target is a cluster, you will need to determine the active node and
failback from that node. Then you will need to failback from each of
the other nodes to synchronize all of the nodes of the cluster.
Note: If your target is a cluster, take the Double-Take Source Connection resource
offline to disconnect the connection.
During the restoration, only the data is restored back to the source. Shares
are not created on the source during the restoration. Shares that were
created on the target during failover will need to be created manually on the
source.
15. On the source, change the IP address that you modified earlier to the unique
address back to its original address. You can also enable any other NICs on the
source.
16. Also on the source, change the source name back to its original name and reboot,
or restart the Workstation, Server, and any other services you were prompted to
stop.
17. Once the source is back online, users can reconnect to the source.
18. Confirm the Replication Console is communicating with the source using the
original IP address.
a. Right-click the source and select Remove.
b. Depending on your configuration, the source may be automatically inserted
back into the Replication Console. If it is not, select Insert, Server. Specify
the source server and click OK.
19. At this time, you can go back to the dialog box in the Failover Control Center.
Select Continue or Stop to indicate if you want to continue monitoring the source.
After you have selected whether or not to continue monitoring the source, the
Note: The source must be online and Double-Take Availability must be running to
ensure that the source post-failback script can be started. If the source has
not completed its boot process, the command to start the script may be lost
and the script will not be initiated.
20. You can now reconnect your original replication set on the source to your target, to
reestablish protection.
Note: If the target is a cluster, you will need to determine the active node and
failback from that node. Then you will need to failback from each of
the other nodes to synchronize all of the nodes of the cluster.
7. Stop any applications that may be running on your source. The files must be
closed on the source so that updated files from the target will overwrite the files on
the source.
8. Now you can begin your restoration process.
a. From the Replication Console on the target, select Tools, Restoration
Manager.
b. Identify the Original Source machine. This is your source machine where
the data originally resided.
c. Select the Restore From machine. This is the target machine where the
copy of the data is stored.
d. Replication Set contains the replication set information stored on the target
machine (the machine in Restore From). If no replication sets are available,
the list will be blank. Select the replication set that corresponds to the data
that you need to restore.
e. Select the Restore To machine. This is your source where the updated data
from the target will be sent.
f. The Restore To and Restore From paths will automatically be populated
when the replication set is selected. The restore to path is the directory that is
the common parent directory for all of the directories in the replication set. If
the replication set crosses volumes, then there will be a separate path for
each volume. The restore from path is the path on the target server where the
replicated files are located.
Note: Restoring across a NAT router requires the ports to be the same as
the original connection. If the ports have been modified (manually or
reinstalled), you must set the port numbers to the same values as the
last valid source/target connection.
g. Select the Use Backup Replication Set check box to use the target’s copy
of the replication set database for the restoration. If this check box is not
marked, you will be accessing the replication set information from the source.
h. Select the Restore Replication Set check box to restore the target’s copy of
the replication set database to the source during the restoration process.
i. Select the restoration conditionals that you want to use.
l Overwrite existing files during restore—This option restores all
existing files by overwriting them. Any files that do not exist on the
source are written also. If this option is disabled, only files that do not
Note: If you are using a database application, do not use the newer
option unless you know for certain you need it. With database
applications, it is critical that all files, not just some of them that
might be newer, get mirrored.
9. Because there are no users accessing the target data, the restoration process is
complete when the Mirror Status is Idle. When the Mirror Status is Idle,
disconnect the restoration connection from the target.
Exchange Note: After the restoration is complete, you will need to rehome the
informational store databases to the source.
1. From a command prompt on the source, run the post_restore_
<source server name>_<target server name>.bat file that
Application Manager automatically generated.
2. Restart any Outlook clients so that they can access the source.
Exchange 2007
l Microsoft Exchange Active Directory Topology Service
l Microsoft Exchange Anti-spam Update
l Microsoft Exchange EdgeSync
l Microsoft Exchange File Distribution
l Microsoft Exchange IMAP4
l Microsoft Exchange Information Store
l Microsoft Exchange Mail Submission
l Microsoft Exchange Mailbox Assistants
l Microsoft Exchange POP3
l Microsoft Exchange Replication Service
l Microsoft Exchange Search Indexer
l Microsoft Exchange Service Host
l Microsoft Exchange System Attendant
l Microsoft Exchange Transport
l Microsoft Exchange Transport Log Search
l Microsoft Search (Exchange)
l World Wide Web Publishing Service
Exchange Note: When you bring the source cluster online, an identical network
name will be active on the target. Therefore, when the source
cluster tries to bring the Exchange virtual server on the source
online, the network name resource will fail and the group will
not come online. Allow the source cluster to finish trying to bring
the resources online before beginning failback.
2. When you bring the source cluster online, an identical network name will still be
active on the target. Because of this, when the source cluster tries to bring up the
EVS on the source, the network name resource will fail and consequently the
group will not come online on the source. You should allow the source cluster to
finish trying to bring the resources online before using the to failback.
3. In the Application Manager, make sure your source target pair is selected and then
on the Monitor tab, click Failback.
Note: The Failback button may not become active right away after completing a
failover. In this case, restart the Application Manager.
Exchange Note: If you deslected any mail stores during your failover configuration,
you may see a message during failback about potential errors
(unpaired mail stores). This message can be disregarded.
If you created any new mail stores on the target after failover, they will
not be failed back.
Mail sent to public folders during failback may be routed to the target
server after Exchange is shut down, which will result in mail being
stuck in the queue. Make sure mail is not sent to public folders until
the failback process is complete.
If you close the Application Manager during failback, you may have to
manually run the post_restore.bat file which starts the Exchange
services and updates public folders on the source.
If your source is an Exchange 2007 CCR, LCR, or SCC cluster, after
failback the CCR, LCR, or SCC replication will need to be manually
reseeded after verifying Exchange is functioning properly. For
information about this process, see Microsoft TechNet Article How to
Seed a Cluster Continuous Replication Copy.
In a like-named cluster environment with more than one DNS server,
there may be a delay contacting the source after failback. The DNS
server used by the source cluster is updated on failback to point back
to the source server. However, if the Application Manager is running
on a machine that uses a different DNS server, it may not recognize
the change until the next DNS zone refresh.
Note: You may notice transaction log files that are not the defined size limit. This
is because data operations are not split. For example, if a transaction log
3. When system memory is full, the most recent changed data is added to the disk
queue, as described in step 2. This means that system memory contains the oldest
data. Therefore, when data is transmitted to the target, Double-Take Availability
pulls the data from system memory and sends it. This ensures that the data is
transmitted to the target in the same order it was changed on the source. Double-
Take Availability automatically reads operations from the oldest transaction log file
into system memory. As a transaction log is depleted, it is deleted. When all of the
transaction log files are deleted, data is again written directly to system memory
(step 1).
4. To ensure the integrity of the data on the target, the information must be applied in
the same order as it was on the source. If there are any delays in processing, for
example because of a locked file, a similar queuing process occurs on the target.
Data that cannot immediately be applied is queued to system memory. By default,
128 or 512 MB of memory is used, depending on your operating system.
5. When the allocated amount of system memory on the target is full, new incoming
data bypasses the full system memory and is queued directly to disk. Data queued
to disk is written to a transaction log. On the target, the transaction logs are
identified with the source IP address, the Double-Take Availability port, the
connection ID, and an incrementing sequence number.
Like the source, system memory on the target contains the oldest data so when data is
applied to the target, Double-Take Availability pulls the data from system memory.
Double-Take Availability automatically moves operations from the oldest transaction log
file to system memory. As a transaction log is depleted, it is deleted. When all of the
transaction log files are deleted, data is again written directly to system memory (step 4).
l Folder—This is the location where the disk queue will be stored. Double-
Take Availability displays the amount of free space on the volume selected.
Any changes made to the queue location will not take effect until the Double-
Take service has been restarted on the server.
When selecting the queue location, keep in mind the following caveats.
Note: Scanning the Double-Take Availability queue files for viruses can
cause unexpected results. If anti-virus software detects a virus in a
queue file and deletes or moves it, data integrity on the target cannot
be guaranteed. As long as you have your anti-virus software
configured to protect the actual production data, the anti-virus software
can clean, delete, or move an infected file and the clean, delete, or
move will be replicated to the target. This will keep the target from
becoming infected and will not impact the Double-Take Availability
queues.
Note: If you are experiencing frequent auto-disconnects, you may want to increase the
amount of disk space on the volume where the Double-Take Availability queue
is located or move the disk queue to a larger volume.
If you have changed data on the target while not failed over, for example if you
were testing data on the target, Double-Take Availability is unaware of the target
data changes. You must manually remirror your data from the source to the target,
overwriting the target data changes that you caused, to ensure data integrity
between your source and target.
3. Verify that the check box Automatically Reconnect During Source Initialization
is marked to enable the auto-reconnect feature.
4. Click OK to save the settings.
Note: If you have multiple connections to the same target, all connections will be
paused and resumed.
Note: If you are going to use failover, any target paths that are blocked will
automatically be unblocked during the failover process so that users can modify
data on the target after failover. During a restoration, the paths are automatically
blocked again. If you failover and failback without performing a restoration, the
target paths will remain unblocked. You can manually block or unblock the target
paths by right-clicking on a connection.
Do not block your target paths if you are protecting a full-server because system
state data will not be able to be written to the target.
Note: If a connection is disconnected and the target is monitoring the source for failover,
you will be prompted if you would like to continue monitoring for a failure. If you
select Yes, the Double-Take Availability connection will be disconnected, but the
target will continue monitoring the source. To make modifications to the failure
monitoring, you will need to use the Failover Control Center. If you select No, the
Double-Take Availability connection will be disconnected, and the source will no
longer be monitored for failure by the target.
If a connection is disconnected while large amounts of data still remain in queue,
the Replication Console may become unresponsive while the data is being
flushed. The Replication Console will respond when all of the data has been
flushed from the queue.
Note: If you are using a database application, do not use the newer option
unless you know for certain you need it. With database applications, it
is critical that all files, not just some of them that might be newer, get
mirrored.
Note: Auto-remirror is a per source option. When enabled, all connections from the
source will perform an auto-remirror after an auto-reconnect. When disabled,
none of the connections from the source will perform an auto-remirror after an
auto-reconnect.
1. Open the Replication Console, and right-click a server in the left pane of the
Replication Console and select Properties.
2. Select the Setup tab.
3. Verify that Perform Remirror After Auto-Reconnect is selected to initiate an
auto-remirror after an auto-reconnect.
4. Verify that Mirror only Changed Files on Source Reboot is selected to use the
Windows NTFS change journal to track file changes. When this option is enabled,
if the source is rebooted, only the files identified in the change journal will be
remirrored to the target. This setting helps improve mirror times.
5. Specify the type of mirror that you wish to perform.
l Differences with Checksum—Any file that is different on the source and
target based on date, time, and/or size is flagged as different. The mirror then
performs a checksum comparison on the flagged files and only sends those
blocks that are different.
l Differences with no Checksum—Any file that is different on the source and
target based on date, time, and/or size is sent to the target.
l Send data only if Source is newer than Target—Only those files that are
newer on the source are sent to the target.
Note: Database applications may update files without changing the date,
time, or file size. Therefore, if you are using database applications,
you should use the Differences with checksum or Full option.
Stopping, starting, pausing, or resuming mirroring contains a
comparison of how the file difference remirror settings work together,
as well as how they work with the global checksum setting on the
Source tab of the Server Properties.
Note: Mirror scripts are dependent on the target and target path location of a
connection. Therefore, if you establish mirror scripts for one connection and then
Note: Orphan file configuration is a per target option. All connections to the same target
will have the same orphan file configuration.
The orphans feature does not move or delete alternate data streams. To do this,
use a full mirror which will delete the additional stream(s) when the file is re-
created.
If Double-Take Availability is configured to move orphan files, the Double-Take
Availability log file will indicate that orphan files have been deleted even though
they have actually been moved. This is a reporting issue only.
If delete orphans is enabled, directories and files that do not exist on the source
and are excluded in the replication set using a wildcard rule will be removed from
the target path. If you have data in your target path that does not exist on the
source, do not use wildcard rules in your replication set. Manually select and
deselect those files which should be included or excluded from your replication
set.
c. Specify if you want to log the name of the orphan files to the Double-Take
Availability log file on the target by marking Log Orphaned Files to Target
Log.
d. By default, the orphan files feature is disabled. To enable it, mark
Move/Delete Orphan Files.
e. Specify if you want to Delete Orphaned Files or Move Orphaned Files to a
different location. If you select the move option, identify the location where
these orphan files will be located.
Note: If you are moving files, make sure the directory you specify to move
the files to is not included in the destination of the replication set data
Note: The default number of files that are listed in the right pane of the Replication
Console is 2500, but this is user configurable. A larger number of file
listings allows you to see more files in the Replication Console, but results
in a slower display rate. A smaller number of file listings displays faster, but
may not show all files contained in the directory. To change the number of
files displayed, select File, Options and adjust the File Listings slider bar
to the desired number.
To hide offline files, such as those generated by snapshot applications,
select File, Options and disable Display Offline Files. Offline files and
folders are denoted by the arrow over the lower left corner of the folder or
file icon.
4. Identify the data on the source that you want to protect by selecting volumes,
drives, directories, and/or specific files.
5. After selecting the data for this replication set, right-click the new replication set
icon and select Save. A saved replication set icon will change from red to black.
Note: If you save changes to a connected replication set, it is recommended that you
perform a mirror to guarantee data integrity between the source and target
machines. A dialog box will appear instructing you to disconnect and reconnect
the replication set and perform a difference mirror.
If your source is a cluster, you must make the same modifications to the
replication set on the non-owning nodes. The replication set rules must be
identical on all nodes for Double-Take Availability to function properly on the
cluster.
Note: If you save changes to a connected replication set, it is recommended that you
perform a mirror to guarantee data integrity between the source and target
machines. A dialog box will appear instructing you to disconnect and reconnect
the replication set and perform a difference mirror.
If your source is a cluster, you must make the same modifications to the
replication set on the non-owning nodes. The replication set rules must be
identical on all nodes for Double-Take Availability to function properly on the
cluster.
4. If the replication set size has never been determined, click Calculate. If the
replication set has previously been determined, the button will be labeled
Recalculate. Depending on user activity, the size shown may not accurately reflect
the current size of the replication set. If changes are occurring to files in the
replication set while the calculation is being made, the actual size may differ
slightly. The amount of data is determined at the exact time the calculation is
made.
5. Click OK to return to the Replication Console.
Note: If you disable this option on a source server, you can still submit tasks to be
processed on a target, although task command processing must be enabled on
the target.
Note: Because of the way the Windows Cache Manager handles memory, machines
that are doing minimal or light processing may have file operations that remain in
the cache until additional operations flush them out. This may make Double-Take
Availability files on the target appear as if they are not synchronized. When the
Windows Cache Manager releases the operations in the cache on the source, the
files will be updated on the target.
l Verify only—This option verifies the data and generates a verification log,
but it does not remirror any files that are different on the source and target.
l Remirror files to the Target automatically—This option verifies the data,
generates a verification log, and remirrors to the target any files that are
different on the source.
l Only if the Source file is newer than Target copy—If you are remirroring
your files, you can specify that only files that are newer on the source than
the target be remirrored.
Note: If you are using a database application, do not use the newer option
unless you know for certain you need it. With database applications, it
is critical that all files, not just some of them that might be newer, get
mirrored.
Note: Database applications may update files without changing the date,
time, or file size. Therefore, if you are using database applications,
you should use the block checksum comparison to ensure proper
verification and remirroring.
4. Specify when you want to start the initial verification. Select the immediate date
and time by clicking Now, or enter a specific Date and Time. The down arrow next
to Date displays a calendar allowing easy selection of any date. Time is formatted
for any AM or PM time.
5. Mark the Reverification Interval check box to repeat the verification process at the
specified interval. Specify an amount of time and choose minutes, hours, or days.
6. Select if you want to Remirror files to the Target automatically. When enabled,
Double-Take Availability will verify the data, generate a verification log, and
remirror to the target any files that are different on the source. If disabled, Double-
Take Availability will verify the data and generate a verification log, but no files will
be remirrored to the target.
Note: If you are using a database application, do not use the newer option unless
you know for certain you need it. With database applications, it is critical
that all files, not just some of them that might be newer, get mirrored.
Note: Database applications may update files without changing the date, time, or
file size. Therefore, if you are using database applications, you should use
the block checksum comparison to ensure proper verification and
remirroring.
4. At the top of the window, Folder identifies the location where the log files identified
on this tab are stored. By default, the log files are stored in the same directory as
the Double-Take Availability program files.
5. Under the Verification section, Filename contains the base log file name for the
verification process. The replication set name will be prefixed to the base log file
Note: Changes made to the verification log in the Server Properties, Logging
tab will apply to all connections from the current source machine.
8. Specify the Language of the log file. Currently, English is the only available
language.
9. Click OK to save the settings.
In the log file, each verification process is delineated by beginning and end markers. A
list of files that are different on the source and target is provided as well cumulative totals
for the verification process. The information provided for each file is the state of its
synchronization between the source and the target at the time the file is verified. If the
remirror option is selected so that files that are different are remirrored, the data in the
verify log reflects the state of the file before it is remirrored, and does not report the state
of the file after it is remirrored. If a file is reported as different, review the output for the file
to determine what is different.
Sample verification log
Note: Files that were replicated with the Replicate NT Security by Name feature
enabled, will be identified as different in the log file because of the local
name attribute. The files will be the same.
Note: The application verification process is not available for Exchange or SQL in a
cluster environment.
The application verification process can only be performed on active connections
that are in a good state and are not failed over.
1. Verify that your current volumes have adequate space to contain snapshots of your
target. These snapshots will be used to revert the target back to its pre-test state
after you have completed your application verification.
2. Disable target path blocking for your application protection connection.
3. Verify that your Double-Take disk queue is not located on a volume that you will be
reverting (a volume with application data). Also verify that the queues have
adequate space to handle the data changes that will be queued while you are
testing your application.
4. If you are verifying Exchange and you are running the Application Manager from a
machine other than the source or target, you must install Exchange System
Manager on that machine.
5. From the Application Manager, select Actions, Verify Target Data.
6. There are four main sections of the Database Verification window.
l Status—The top of the window displays the overall status of the application
verification. You can click on the status description for more detailed
information.
l Results—Initially, the state of the application verification is unknown, as
indicated by the question mark icon. When the databases or stores have
been successfully mounted, the states will update to green.
l History—This area shows the sequence of verification events.
l Options—You can select which services are tested and specify scripts to run
during the test.
l Start core services only—Only the core application services will be started
when the test is performed.
l Start selected services—All of the services you configured for application
failover will be started when the test is performed. Use this option if you have
an application add-on such as BlackBerry.
Command
TDV
Description
Utility that confirms that the application database on the target is viable for
failover
Syntax
TDV /APPTYPE <SQL | EXCHANGE> /DNSDOMAIN <domain_name>
/SRCNAME <source_name> /TARNAME <target_name> /MODE
<INSTANCE|DATABASE> [/PORT <port_number>] [/USERNAME
<user_name>] [/PASSWORD <password>] /SVC <APP|ALL>
[/ADDONSVC <service1,service2, ..>] [/SETPASSWORD <username>
<password>] [/GETPASSWORD] [/SCRIPTPOST <post_online>]
[/SCRIPTPRE <pre_restore>] /SRCEXCHVER <2003|2007>
/TAREXCHVER <2003|2007> /SRCVER
<2000|2005|2008|MSDE|EXPR> /TARVER
<2000|2005|2008|MSDE|EXPR> [/INTERACTIVE] [/HELP]
Options
l APPTYPE—Specify the keyword SQL or EXCHANGE to indicate the
application being verified on the target
l DNSDOMAIN <domain_name>—Fully-qualified name of the domain
l SRCNAME <source_name>—Name of the source server
l TARNAME <target_name>—Name of the target server
l MODE—Specify the keyword INSTANCE or DATABASE to indicate
the type of SQL database being verified
l PORT <port_number>—The source and target port number. This port
number must be the same on both servers.
l USERNAME <user_name>—Name of the user login account
l PASSWORD <password>—The password associated with specified
user name
l SVC—Specify the keyword APP or ALL to indicate if only the core
application services will be started when the test is performed or if all of
Note: Double-Take Availability checks the schedule once every second, and if a user-
defined criteria is met, transmission will start or stop, depending on the option
specified.
Any replication sets from a source connected to the same IP address on a target
will share the same scheduled transmission configuration.
Note: A Transmission Session Start setting will override any other start
criteria. For example, if you set the Transmission Session Start and
the Queue Threshold, transmission will not start until you reach the
indicated start time.
5. Schedule any desired stop criteria to stop transmission after a transmission start
criteria has initiated the transmission. If you do not establish a stop criteria,
transmission will end when the queue is empty. Select the Stop option in the Limit
Type box.
Define the stop options to stop Double-Take Availability transmissions by using
either or both of the following options.
Note: The transmission start and stop criteria should be used in conjunction
with each other. For example, if you set the Queue Threshold equal
to 10 MB and the Byte Limit equal to 10 MB, a network connection
Note: Any replication sets from a source connected to the same IP address on a target
will share the same bandwidth limitation configuration.
You will not be able to set a limit lower than 100% of a 28.8 Kbps connection
speed. A setting this low would cause abnormal behavior between Double-Take
Availability servers because of the lengthy delay between commands and
responses transmitted between the two servers.
You cannot set a bandwidth limit of zero (0). If you need to stop data transmission
completely, use the stop criteria on the Connection Manager Transmit tab.
Note: You can establish a bandwidth schedule and then disable or override it by
selecting No Bandwidth Limit or Fixed Bandwidth Limit. The schedule
criteria will be saved and will not be reactivated until you reselect
Scheduled Bandwidth Limit.
You can modify the bandwidth limits applied to a connection that is already
established by right-clicking on the connection and selecting Set
Bandwidth. A modified version of the Connection Manager Bandwidth tab
will allow you to select a different bandwidth limitation. You cannot create a
schedule from this dialog box. An existing schedule must already exist in
the Connection Manager.
Note: Any replication sets from a source connected to the same IP address on a target
will share the same compression configuration.
Keep in mind that the process of compressing data impacts processor usage on the
source. If you notice an impact on performance while compression is enabled in your
environment, either adjust to a lower level of compression, or leave compression
disabled. Use the following guidelines to determine whether you should enable
compression:
l If data is being queued on the source at any time, consider enabling compression.
l If the server CPU utilization is averaging over 85%, be cautious about enabling
compression.
l The higher the level of compression, the higher the CPU utilization will be.
l Do not enable compression if most of the data is inherently compressed. Many
image (.jpg, .gif) and media (.wmv, .mp3, .mpg) files, for example, are already
compressed. Some images files, such as .bmp and .tif, are uncompressed, so
enabling compression would be beneficial for those types.
l Compression may improve performance even in high-bandwidth environments.
l Do not enable compression in conjunction with a WAN Accelerator. Use one or the
other to compress Double-Take Availability data.
Use the following instructions to configure data compression.
1. Right-click the connection on the right pane of the Replication Console and select
Connection Manager.
2. Select the Compression tab.
Mirror started
l State—Bad
l Description—Mirroring has started, but is not complete. The data on the source
and target will not be synchronized until the mirror is complete.
l Automatic action taken for scheduled and automatic snapshots—Scheduled
and automatic snapshots will be delayed until the mirror is complete before taking
a snapshot.
l User interaction required for manual snapshots—Wait until the mirror is
complete and the data is in a good state, then take a manual snapshot.
Mirror stopped
l State—Bad
l Description—Mirroring has stopped without completing. The data on the source
and target will not be synchronized until the mirror is complete.
l Automatic action taken for scheduled and automatic snapshots—Scheduled
and automatic snapshots will be delayed until the mirror has been restarted and is
complete before taking a snapshot.
l User interaction required for manual snapshots—Restart the mirror, wait until it
is complete and the data is in a good state, and then take a manual snapshot.
Mirror complete
l State—Good
l Description—Because the mirror is complete, the data on the source and target is
synchronized. Double-Take Availability will take a snapshot while the data is in a
good state.
l Automatic action taken for scheduled and automatic snapshots—Scheduled
and automatic snapshots will occur normally.
l User interaction required for manual snapshots—Manual snapshots can be
taken normally.
Restore required
l State—Good or bad
l Description—The data on the target no longer matches the data on the source
because of a failover. This does not necessarily mean that the data on the target is
bad.
l Automatic action taken for scheduled and automatic snapshots—Scheduled
and automatic snapshots will be delayed until a restore is completed or the
Restore Required state is overruled by a mirror. Once the restoration or mirror is
complete, automatic and scheduled snapshots will occur normally.
l User interaction required for manual snapshots—Restore the target data back
to the source or overrule the Restore Required state by performing a mirror. Once
the restoration or mirror is complete, manual snapshots can be taken normally.
Snapshot reverted
l State—Good or bad
l Description—The data on the target no longer matches the data on the source
because a snapshot has been applied on the target. This does not necessarily
mean that the data on the target is bad.
Restore complete
l State—Good
l Description—Because the restoration is complete, the data on the source and
target is synchronized.
l Automatic action taken for scheduled and automatic snapshots—Scheduled
and automatic snapshots will occur normally.
l User interaction required for manual snapshots—Manual snapshots can be
taken normally.
To be completely assured that your data on the target is good, automatic and scheduled
snapshots only occur when the data is in a good Double-Take Availability state.
However, manual snapshots can be taken during any state. There are instances when
you may want to take a manual snapshot, even if the target data is in a bad state. For
example, if you drop an operation, that does not necessarily mean your data on the
target is corrupt or the target would be unable to stand in for the source in the event of a
failure. A snapshot of a bad state may be useful and usable, depending on your
environment. If your source is a file server and an operation has been dropped, it is just
one user file that is out-of-date. All of the remaining target files are intact and can be
accessed in the event of a failure.
However, if your source is an application server and an operation has been dropped,
that one file could cause the application not to start on the target in the event of a failure.
In these cases, manual snapshots of a bad state depend on the context of your
environment.
Note: Because the driver for Volume Shadow Copy is started before the driver for
Double-Take Availability, if you revert any files on the source that are contained
in your replication set, Double-Take Availability will not be aware of the revert
and, therefore, the file change will not be replicated to the target. The file change
will be mirrored to the target during the next mirroring process.
Use the following options to manage your full-server and application workload
snapshots. (The dialog box will appear different between the Full-Server Failover
Manager and the Application Manager, but the options are the same.)
Note: The Schedule options at the top of the are the same options from when you
configured protection. If you change the options in one location, they will be
changed in the other location too.
The Existing Snapshots list only contains snapshots from full-server and
application protection workloads. Snapshots from other utilities and tools will not
be listed.
Note: You can disable the feature that maintains the security credentials in the
registry.
Note: The credentials buffer is cleared each time the client application is closed.
The client tries each of these three methods until a set of credentials granting
Administrator access is found. If no credentials granting Administrator access are found,
the client attempts to find a set of credentials granting Monitor access. If no credentials
grant Monitor access, the user must manually logon to the source or target by providing a
user name, password, and domain.
Note: If Double-Take Availability is installed on a member servers, it will use the local
groups. If an Active Directory user is granted access to the Active Directory
Double-Take Admin or Double-Take Monitors groups, the user or domain
group must also be granted access to the local Double-Take Availability groups.
If Double-Take Availability is installed on a domain controller, the Active
Directory group will provide sufficient access. The groups are created in the
Users OU and need to stay here. If the groups are not there, users will be unable
to log into Double-Take Availability on the domain controller.
Users that need administrator access to Double-Take Availability must be added to the
Double-Take Admin group. All users that need monitor only access must be added to
the Double-Take Monitors group. In both cases, local users, domain users, or global
groups may be added to the local groups.
To add, delete, or modify users for a group, follow these steps.
1. Select Start, Programs, Administrative Tools, and User Manager. (If you are on
a domain controller, select User Manager for Domains.)
2. Double-click the group to be modified or highlight it and select User, Properties.
3. To add local users, domain users, and/or global groups to the group, click Add.
4. Select the local user, domain user, and/or global group to be included in the
security group.
5. Click OK to return to the Local Group Properties dialog box.
6. Click OK to return to the User Manager.
7. Exit the User Manager.
Note: If you are protecting full-server workloads, you cannot modify the account used to
run the Double-Take service. Otherwise, the full-server protection will not function
correctly.
Note: If your corporate policies require that only the minimum required privileges
be supplied, you can select only the permissions listed below by modifying
the Advanced permissions for the account.
Note: For the evaluation, you should install in a test environment. Do no use actual
production servers because you will be forcing a failure during the evaluation.
Note: If the Double-Take Servers root is highlighted in the left pane of the
Replication Console, the Connection Wizard menu option will not be
available. To access the menu, expand the server tree in the left pane, and
highlight a server in the tree.
3. The Connection Wizard opens to the Welcome screen. Review this screen and
click Next to continue.
Note: At any time while using the Connection Wizard, click Back to return to
previous screens and review your selections.
4. If you highlighted a source in the Replication Console, the source will already be
selected. If it is not, select the Double-Take Availability source. This is the server
that you want to protect. Click Next to continue.
5. If you highlighted a target in the Replication Console, the target will already be
selected. If it is not, select the Double-Take Availability target. This is your backup
server that will protect the source. Click Next to continue.
6. On the next screen, verify Create a new replication set with this name is
selected.
7. Enter a name for your replication set, and click Next to continue.
8. A tree display appears identifying the volumes and directories available on your
source. Mark the check box of the volumes and/or directories you want to protect.
Click Next to continue.
9. There are two pre-defined locations to store the source data on the target, or you
can select a custom location. For this evaluation, select the option Send all data to
the same path on the target. This option keeps the directory structure on the
source and target identical.
10. Click Next to continue.
11. Review your selections on the summary screen. You do not need to set any
advanced options for this evaluation, so click Finish. The Connection Wizard will
close, the connection will be established, and mirroring and replication will begin.
12. You will be prompted to save your newly created replication set. Click Yes to save
it.
To view specific mirroring statistics that may be of interest, use the horizontal scroll bar
at the bottom of the right pane to view the various columns.
l Sent (Bytes)—The total number of mirror and replication bytes that have been
sent during this connection.
l Sent Mirror (Bytes)—The total number of mirror bytes only that have been sent
during this connection.
l Skipped Mirror (Bytes)—The total number of bytes that have been skipped when
performing a difference or checksum mirror. These bytes are skipped because the
data is the same on the source and target machines.
l Remaining Mirror (Bytes)—The total number of mirror bytes only that remain to
be sent to the target.
Monitoring a data workload contains complete details on all of the Replication Console
statistics. After your mirror is complete, look at your target and you will see the replicated
data stored in the location you specified. Now you are ready to continue with the
evaluation.
You may notice your Replication Status toggle between Replicating and Ready as it
continues processing the file changes, when your Replication Status stays at Ready,
Double-Take Availability is waiting for additional changes to transmit. After replication is
complete, you are ready to continue with the evaluation.
Note: Because of the way the Windows Cache Manager handles memory, machines
that are doing minimal or light processing, as you are in this evaluation, may have
file operations that remain in the cache until additional operations flush them out.
This may make Double-Take Availability files on the target appear as if they are
not synchronized. When the Windows Cache Manager releases the operations in
the cache on the source, the files will be updated on the target. To make sure this
does not impact your testing, flush the cache by copying a couple of files from
one directory to another and then deleting them.
1. Browse your source and target. Compare the directory structures and the total
number of files.
2. Look again at the four files you modified earlier. Verify manually that the changes
you made have been applied to the target copy of the file.
3. Right-click the connection on the right pane of the Replication Console and select
Verify. You will see two choices on the Start Verification dialog box.
l Verify only—This option performs the verification process by comparing the
date, time and size of each file and generates a verification report identifying
the files that are not synchronized.
l Remirror data to the target automatically—This option performs the
verification process by the comparison method specified, generates a
verification report, and then remirrors those files from the source to the target
that are not synchronized.
4. Select Verify only and click OK.
Note: Since your target file is newer, make sure that Only if Source file is newer
than Target copy is not selected.
7. Look at the file on the target that you modified and confirm that your changes are
gone. The source version has overwritten the file on the target.
Note: You can minimize the Failover Control Center and, although it will not appear in
your Windows taskbar, it will still be active and the failover icon will still appear in
the desktop icon tray.
Monitoring failover monitoring contains more information on the Failover Control Center
visual indicators.
Note: The Event log on the target provides details on the actual steps that have
occurred during failover.
Note: Do not connect the source machine to the network at this time.
3. In the Failover Control Center, select the target that is currently standing in for the
failed source.
4. Select the failed source and click Failback.
5. You will be prompted to determine if you want to continue monitoring the source.
Do not make any selections at this time.
2. Identify the Original Source machine. This is your source machine where the data
originally resided.
3. Select the Restore From machine. This is the target machine where the copy of
the data is stored.
4. Replication Set contains the replication set information stored on the target
machine (the machine in Restore From). If no replication sets are available, the
list will be blank. Select the replication set that corresponds to the data that you
need to restore.
Note: For the evaluation, you should install in a test environment. Do no use actual
production servers because you will be forcing a failure during the evaluation.
4. Optional protection settings are available but are not required for the evaluation.
Feel free to review the optional settings, if desired. A complete description of each
setting can be found in Optional full-server protection settings.
5. You must validate that your target is compatible with your source and can stand-in
if the source fails. Click Validate configuration. The Validation tab at the bottom of
the Full-Server Failover Manager updates to display the validation check. Errors
are designated by a white X inside a red circle. Warnings are designated by a
black exclamation point (!) inside a yellow triangle. A successful validation is
designated by a white checkmark inside a green circle.
1. Watch as the mirroring percentage increases. When the mirroring is complete, the
status will change to Enabled.
2. Look at your target and you will see the data from the source.
Once protection is Enabled, if the source should fail, the target can stand-in for the
source.
Note: Because of the way the Windows Cache Manager handles memory,
machines that are doing minimal or light processing, as you are in this
evaluation, may have file operations that remain in the cache until
additional operations flush them out. This may make Double-Take
Availability files on the target appear as if they are not synchronized. When
the Windows Cache Manager releases the operations in the cache on the
source, the files will be updated on the target. To make sure this does not
impact your testing, flush the cache by copying a couple of files from one
directory to another and then deleting them.
Note: If you are testing failover and your source is a domain controller, do not let the
domain controller communicate with any other production domain controllers after
failover. Otherwise, when the original source domain controller is brought online
after the test, it may create a USN rollback scenario if the test domain controller
was allowed to communicate with other production domain controllers.
3. Monitor the failover percentage as shown in the Protection Status. At the end of
After your target has failed over and becomes your source, you can stay with that
configuration long term. However, in some instances, it may be necessary or desired to
go back to using the original hardware after you have failed over.
A
A records 220
ACLs (access control list) 541
activation codes 69, 128, 164
Active Directory
application 249
data failover 151
service 608
adding servers 81-84
alternate data streams 541
application
advanced settings 245
compression 244
connections 229, 252
database storage files 234, 239, 241
failover 218, 220, 223, 225, 251, 257
file shares 238
firewall 253
managing servers 125
mirror settings 244
NAT 253
protection 208-209, 231
replication set 246
requirements 45
B
backup 526
bandwidth
ESX 261, 292
Hyper-V 261, 272
limiting 583
standard cluster 302
BIND DNS client 347
BlackBerry
protection 231
requirements 53
C
chained configuration 26
cluster
failover 333
monitoring 388
requirements 44, 46, 50, 61
workload 20, 24, 132, 301-302, 319
D
data
evaluating 611
failover 150
failover monitoring 363
monitoring 353-354
server settings 161
workload 132-133
E
e-mail notification
data 185, 438
ESX 131, 294
EFO 257
encrypted files 541
error codes 468
ESX
activation codes 128
console 127, 130
e-mail notification 131, 294
installation 69
login 281
failback
application 508
data workload 495-496, 502
DNS 512
full-server 507
identity 509
virtuals 515
workload 494
G
GeoCluster
compression 319, 326
monitoring 388
online pending 326
orphan files 319, 326
requirements 61
resource properties 326
Windows configuration 75
workload 20, 24, 301, 319
getting started 81, 83-84
H
hosts file 220
Hyper-V
monitoring 371
protection 260, 272
requirements 55-56, 59
I
ICMP 145
identity failover 223
importing server configuration file 81, 83-84
installation 69
automatic process 71
J
junction points 541
L
licensing 164
logging
event messages 410-411
filtering 400
log file 182, 393, 402
messages 403
verification 565
viewing log file 394
logging on and off
Replication Console 98
LogViewer 400
M
Macintosh
files 541
shares 349
many-to-one configuration 26
memory requirements 33
mirroring 139
application workload 244
automatically 532
controls 530
N
named pipes 98
NAT 133, 145, 204, 253
NetBIOS 336
network communications
data workload 169
full-server workload 199
NFS shares 351
O
one-to-many configuration 26
P
path 372
Performance Monitor 453-455
ports 59-60, 94, 279
application workload 253
ESX 280
Failover Control Center 115
full-server workload 204
NAT 204, 253
NAT or firewall 145
server 169
virtual workload 297
pre-requisites See requirements
pre-staging 261
protection
application 209
cluster 301
data 133
ESX 260-261
full-server 188
Q
queues
auto-disconnect 523
auto-reconnect 523
overview 517
queuing data 170, 519
R
reconnecting automatically 525
refresh rate 93
remirror 139
reparse points 541
replication
capabilities 541
overview 15, 540
starting 558
tasks 559
Replication Console
group and server configuration 109
logging on and off 98
message window 394
overview 97
security credentials 113
starting 97
tree 101
workspaces 110
S
scheduling 290, 577
scripts
application 248
credentials 184
data failover 151
mirroring 534
T
target
block writing 527
data processing options 177
definition 14
pause 526
U
UDP 145
undo failover 492-493
upgrade
notes 64
overview 63
process 66
V
verification
application 572
W
WINS 337
workload
monitoring 352
overview 20-24
protection 132