Resumen del contenido incluido en la página 1
NEC Storage Manager
Data Replication User’s Manual
(Installation and Operation
Guide for Windows)
IS016-5E
Resumen del contenido incluido en la página 2
© NEC Corporation 2001-2004 No part of the contents of this book may be reproduced or transmitted in any form without permission of NEC Corporation. The contents of this book may be modified without notice in the future.
Resumen del contenido incluido en la página 3
Preface This manual describes how to use the data replication function provided by NEC Storage DynamicDataReplication Ver2, NEC Storage RemoteDataReplication Ver2, and NEC Storage ReplicationControl. The data replication function consists of the replication volume creation function provided in a disk array subsystem and software to manage and operate it. It utilizes replication volume to make business operation more effective. Refer to the “NEC Storage Manager Manual Guide” (IS901) f
Resumen del contenido incluido en la página 4
Description Corresponding Manual Messages Handbook NEC Storage Manager Messages Handbook (IS010) Data Replication User’s Manual NEC Storage Manager Data Replication User’s Manual (Function Guide) (Function Guide) (IS015) Data Replication Command Reference NEC Storage Manager Data Replication Command Reference (IS021) PerformanceMonitor User’s Manual NEC Storage PerformanceMonitor User’s Manual (IS025) 6. Trademarks and registered trademarks • Microsoft®, Windows® are registered tradem
Resumen del contenido incluido en la página 5
Contents Chapter 1 Installation Procedure.......................................................................................................................................1 1.1 Installation Procedure..................................................................................................................................................1 1.2 System Configuration.........................................................................................................................
Resumen del contenido incluido en la página 6
This page is intentionally left blank. ii
Resumen del contenido incluido en la página 7
Chapter 1 Installation Procedure Chapter 1 Installation Procedure This chapter describes the system installation procedures showing an example of a tape backup system that uses the 2000 series disk array subsystem. 1.1 Installation Procedure 1.1 Installation Procedure 1.1 Installation Procedure Installation works are outlined below. For details of the procedures, refer to the associated sections. 1. Determining the system configuration 1.2.1 Hardware Configuration Select n
Resumen del contenido incluido en la página 8
Chapter 1 Installation Procedure 1.2 System Configuration 1.2 System Configuration 1.2 System Configuration 1.2.1 Hardware Configuration 1.2.1 Hardware Configuration 1.2.1 Hardware Configuration Select hardware components according to the business conditions, requirements, disk capacity, and so forth. Figure 1-1 shows an example of hardware configuration. Management Server LAN LAN Business Business Backup Server Specific Server Server for Inter- (Operated (S
Resumen del contenido incluido en la página 9
Chapter 1 Installation Procedure 1.2.2 Software Configuration 1.2.2 Software Configuration 1.2.2 Software Configuration Select software to be used according to the hardware components, operating conditions, etc. Figure 1-2 shows a software configuration example. Storage Manager LAN Backup Server Business Server Business Server (Operated (Standby) primarily) ReplicationControl PathManager LTO ReplicationControl Dir No.1 Switch Switch Port No.1 PathManager
Resumen del contenido incluido en la página 10
Chapter 1 Installation Procedure 1.3 Software Installation 1.3 Software Installation 1.3 Software Installation 1.3.1 Replication Management 1.3.1 Replication Management 1.3.1 Replication Management (1) Operating Environment Replication Management (Server) The replication management function is included in the iSM server. For the operating environment, refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS. Replication Management (GUI) The replicatio
Resumen del contenido incluido en la página 11
Chapter 1 Installation Procedure Replication Management (GUI) Uninstallation Refer to the “User’s Manual” or “User’s Manual (UNIX)” in accordance with your OS to uninstall the Replication Management (GUI). (4) Software Update iSM Server Update To update the iSM server, uninstall the existing software, and then install the new software. Replication Management (GUI) Update To update the iSM client, uninstall the existing software, and then install the new software. 1.3.2 Repli
Resumen del contenido incluido en la página 12
Chapter 1 Installation Procedure (2) ReplicationControl Software Installation To install ReplicationControl, follow the procedure below. (1) Log on as the Administrator. (2) Set the ReplicationControl installation media on CD-ROM drive and execute the following install program in the CD-ROM drive: \iSMRC\SETUP.EXE (3) Follow the directions of the installer. The following software components are installed: • ReplicationControl • Storage Manager Volume List To use the Replicati
Resumen del contenido incluido en la página 13
Chapter 1 Installation Procedure (4) Select the deletion of the following software component by using [Add/Remove Programs] ([Add or Remove Programs] for Windows Server 2003) in [Control Panel] to start uninstallation: • ReplicationControl (5) Follow the directions of the uninstaller. The following software components are uninstalled: • ReplicationControl • Storage Manager Volume List If the Storage Manager Volume List or ReplicationControl command is running or the Volume List Displ
Resumen del contenido incluido en la página 14
Chapter 1 Installation Procedure ReplicationControl outputs the operation trace (trace log) in the folder iSMrpl\etc\trace under the folder where ReplicationControl has been installed (\Program Files\NEC\iSMrpl\etc\trace\ by default) to deal with faults if occur. In operation trace files, messages output to the standard output, standard error output, event log, and command trace and the detailed internal information are recorded. These files are used as important data for analyzing a f
Resumen del contenido incluido en la página 15
Chapter 1 Installation Procedure 1.4 Disk Array Configuration 1.4 Disk Array Configuration 1.4 Disk Array Configuration For the disk array to be connected, determine the configuration for using the data replication. 1.4.1 Logical Disk (LD) Selection 1.4.1 Logical Disk (LD) Selection 1.4.1 Logical Disk (LD) Selection According to the disk capacity necessary for business or operation conditions, determine the logical disk (LD) and hot spare configurations. For the 4000 series and the
Resumen del contenido incluido en la página 16
Chapter 1 Installation Procedure Figure 1-4 shows an example of setting five pairs and one IV on the backup server as a control volume. A control volume is used when a server issues control I/O to the relevant disk array. For details of a control volume, refer to 1.5 “Control Volume Setting”, 3.9 “Control Volume”, and the “Data Replication User’s Manual (Function Guide)”. MV RA NK00 RANK01 RANK02RANK03 RANK04 LD00 LD01 LD02 LD03 LD04 PD00 PD01 PD02 PD03 PD04 PD05 PD06 PD07 PD0
Resumen del contenido incluido en la página 17
Chapter 1 Installation Procedure 1.4.2 Settings of Disk Array Name, Logical 1.4.2 Settings of Disk Array Name, Logical 1.4.2 Settings of Disk Array Name, Logical Disk Name, and Port Nam Disk Name, a e Di nd Port Name sk Name, and Port Name You can assign identification names to hardware components managed by the iSM. Identification names can be given to the following items: • Disk array subsystem name • Logical disk name (plus OS type) • Port name A disk array subsystem name, log
Resumen del contenido incluido en la página 18
Chapter 1 Installation Procedure Table 1-3 gives an example of setting logical disk names and OS types for an LD configuration example when a control volume is used (Figure 1-4). Table 1-3 Example of Setting Logical Disk Names and OS Types (When a Control Volume Is Used) LD No. OS type Logical disk name Remarks 00 DB_DATA_MV MV for DB data file 01 DB_REDO1_MV MV for DB REDO file 1 02 DB_REDO2_MV MV for DB REDO file 2 03 DB_CTL_MV MV for DB control file 04 DB_ARCHIVE_MV MV for DB arc
Resumen del contenido incluido en la página 19
Chapter 1 Installation Procedure 1.4.3 Access Control Setting 1.4.3 Access Control Setting 1.4.3 Access Control Setting Normally, in a system without clusters, one volume cannot be connected to more than one server to prevent data inconsistency due to file update from servers. To prevent erroneous updates to this volume or erroneous changes to disk configuration on the business servers, the RV must be separated using Access Control, etc. from the business server that uses the MV. Furth
Resumen del contenido incluido en la página 20
Chapter 1 Installation Procedure Table 1-5 Access Control Setting Example Director No. Port No. Access Control settings Server connected 00 00 LD00 to LD04 Business server 01 00 00 01 LD05 to LD09 Backup server 01 01 Table 1-6 gives an Access Control setting example for an LD configuration example when a control volume is used (Figure 1-4). Table 1-6 Access Control Setting Example (When a Control Volume is Used) Director No. Port No. Access Control settings Server connected 0