Professional Documents
Culture Documents
Version 4.4
Administrator's Guide
P/N 302-002-495
REV 01
CONTENTS
Figures
Tables
11
Chapter 1
Getting Started
13
Chapter 2
Dashboard
37
CONTENTS
Filter events..................................................................................... 48
Copy an event to the clipboard.........................................................49
Collect system information around a specific event.......................... 50
Chapter 3
Protection
51
RecoverPoint Protection................................................................................ 52
Protect Volumes............................................................................................ 53
Protecting volumes.......................................................................... 53
Policy Templates........................................................................................... 68
Display all policy templates..............................................................69
Create new policy templates............................................................ 69
Modify existing policy templates...................................................... 70
Remove a policy template................................................................ 71
Apply a policy template to a new consistency group......................... 71
Apply a policy template to an existing consistency group................. 72
Group Sets.................................................................................................... 73
How group sets work........................................................................73
Display all group sets.......................................................................74
Create a group set............................................................................ 74
Edit a group set................................................................................ 75
Remove a group set..........................................................................76
Enable or disable all groups in a group set....................................... 77
Pause or start transfer for all groups in a group set........................... 77
Apply a bookmark to all of the groups in a group set........................ 77
Initiate recovery activities for a group set......................................... 77
Manage Protection........................................................................................ 78
Before you begin.............................................................................. 80
The RecoverPoint protection policies................................................80
Monitoring and managing protection................................................90
Monitoring and managing groups.....................................................91
Monitoring and managing copies................................................... 105
Modifying consistency groups........................................................ 114
Modifying copies............................................................................129
Modifying links.............................................................................. 132
Modifying replication sets.............................................................. 132
Modifying journals......................................................................... 136
Modifying snapshots......................................................................138
Chapter 4
Recovery
145
Chapter 5
RPA Clusters
181
CONTENTS
Chapter 6
Admin
215
CONTENTS
Chapter 7
Support
273
RecoverPoint Support..................................................................................274
RecoverPoint Documentation......................................................... 274
EMC Online Support....................................................................... 275
The RecoverPoint Community......................................................... 276
Chapter 8
Troubleshooting
279
CONTENTS
Add more LUNs than allowed per VNX storage group................................... 290
How do I know I need more VNX LUNs?...........................................290
What can I do if I need more VNX LUNs?......................................... 290
How can I verify that the storage groups were added successfully?.291
Swap the LUN numbers of journal volumes..................................................291
Find your array serial numbers.....................................................................291
Find the serial numbers of VNX arrays............................................ 291
Find the serial numbers of Symmetrix arrays.................................. 292
Find the serial numbers of VPLEX arrays......................................... 292
Find your RPA cluster IDs............................................................................. 293
Find your XtremIO cluster IDs.......................................................................293
Find your XtremIO cluster IDs (PSNTs) in XtremIO............................293
Find your XtremIO cluster IDs (PSNTs) in RecoverPoint....................294
Understanding the RecoverPoint license..................................................... 294
Calculate your required journal size............................................................ 297
Minimum journal size with snapshot consolidation........................298
Validate replication integrity....................................................................... 304
How can replication integrity be compromised?..............................304
When should I validate replication integrity?.................................. 304
How the integrity check tool works................................................. 305
How the periodic integrity validation tool works............................. 305
How do I configure integrity validation?..........................................306
How do I know whether or not integrity validation was successful?.307
Can I disable or enable integrity validation globally?...................... 307
What should I do if an issue is detected?........................................308
MetroPoint group conversion...................................................................... 308
Chapter 9
Events
309
Normal Events.............................................................................................310
Detailed events........................................................................................... 320
Advanced events.........................................................................................360
CONTENTS
FIGURES
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
LAC email...................................................................................................................... 21
Getting Started Wizard Welcome screen.........................................................................28
Getting Started Wizard Add Licenses screen.................................................................. 29
Getting Started Wizard Enable Support screen............................................................... 29
Getting Started Wizard Register RecoverPoint screen..................................................... 30
Unisphere for RecoverPoint............................................................................................32
DashboardOverall Health tab.........................................................................................39
RPA clusters map widget................................................................................................40
Alerts widget..................................................................................................................42
Alerts table.................................................................................................................... 42
System traffic widget..................................................................................................... 43
Consistency group transfer status widget.......................................................................43
Dashboard System Limits tab........................................................................................ 45
DashboardSystem Events.............................................................................................. 47
Identifying a distributed group.....................................................................................100
Identifying a distributed group.....................................................................................100
Recovery bar for consistency groups............................................................................ 173
Recovery bar for group sets..........................................................................................174
RPA Clusters: General Cluster Info................................................................................183
RPA Clusters: Storage.................................................................................................. 185
RPA Clusters: Splitters................................................................................................. 198
RPA ClustersRPA-Cluster-Name tabRPAs...................................................................... 204
RPA ClustersRPA-Cluster-Name tabRPAsProperties.......................................................205
RPA ClustersRPA-Cluster-Name tabRPAsStatus............................................................ 206
RPA ClustersRPA-Cluster-Name tabRPAsInterface ........................................................ 207
RPA ClustersRPA-Cluster-Name tabRPAsTraffic Statistics..............................................207
RPA ClustersRPA-Cluster-Name tabRPAsUsage Statistics..............................................209
RPA Clusters: vCenter Servers...................................................................................... 211
RecoverPoint Documentation page on EMC Online Support..........................................275
EMC Online Support page............................................................................................ 276
The RecoverPoint Community page.............................................................................. 277
License file format....................................................................................................... 294
Example licenses.........................................................................................................295
FIGURES
10
TABLES
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
Licensing support.......................................................................................................... 27
Dashboard options........................................................................................................ 38
RPA clusters map icons..................................................................................................40
RPA clusters map options.............................................................................................. 41
Transfer state.................................................................................................................43
System LimitsSystem tab...............................................................................................45
System LimitsGroup tab.................................................................................................46
System LimitsStorage tab ............................................................................................. 46
System LimitsSplitters tab............................................................................................. 46
Event Filter settings....................................................................................................... 48
Protection options......................................................................................................... 52
Toolbar options............................................................................................................. 56
Group summary screen.................................................................................................. 66
Default policy templates................................................................................................ 68
Multiple consistency group monitoring options............................................................. 79
Multiple consistency group actions................................................................................79
Group policies............................................................................................................... 80
Link policies.................................................................................................................. 83
Copy policies................................................................................................................. 86
Journal policies..............................................................................................................87
Status tab......................................................................................................................91
Status tab options when a group is selected..................................................................92
Priority setting default values........................................................................................ 97
Consolidated statistics output..................................................................................... 101
Status tab....................................................................................................................105
Status tab options when a group is selected................................................................106
Copy journal tab.......................................................................................................... 110
Journal Tab: Snapshot Consolidation Progress information.......................................... 112
Journal tab image list...................................................................................................112
Snapshot policies........................................................................................................139
Recovery options......................................................................................................... 146
Select an Image screen................................................................................................150
Image access mode..................................................................................................... 152
XtremIO snap-based replication mitigation after failover..............................................167
RPA cluster options......................................................................................................182
RPA cluster information............................................................................................... 184
Storage information.....................................................................................................186
Resource pool storage information.............................................................................. 194
Splitter information..................................................................................................... 199
Volume information..................................................................................................... 200
RPA Clusters: RPA table............................................................................................... 204
RPA Clusters: RPA properties tab................................................................................. 205
RPA Clusters: RPA status tab........................................................................................206
Virtual machine info.................................................................................................... 212
RPA Clusters: Add vCenter Server.................................................................................213
Edit vCenter Server Settings.........................................................................................213
Admin options............................................................................................................. 216
Displayed license information..................................................................................... 219
Automatically registering your RecoverPoint system.....................................................222
Pre-defined users........................................................................................................ 226
Pre-defined roles......................................................................................................... 230
RecoverPoint 4.4 Administrator's Guide
11
TABLES
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
12
Permissions.................................................................................................................231
Role settings................................................................................................................232
LDAP Configuration settings.........................................................................................235
Bottleneck detection settings...................................................................................... 240
Bottleneck detection commands................................................................................. 241
Load balancing commands.......................................................................................... 244
System information collection settings........................................................................ 249
Collect system information options..............................................................................252
Event Filter settings..................................................................................................... 255
Email settings..............................................................................................................257
Syslog settings............................................................................................................ 259
SNMP settings............................................................................................................. 259
RecoverPoint SNMP trap variables............................................................................... 261
System parameters sent to SyR....................................................................................265
Support options...........................................................................................................274
License file variables................................................................................................... 295
Journal size with snapshot consolidation equation legend...........................................299
Normal scope events................................................................................................... 310
Detailed scope events................................................................................................. 320
Advanced scope events............................................................................................... 360
CHAPTER 1
Getting Started
This section describes the first steps to setting up your RecoverPoint system.
l
l
l
l
l
l
l
l
Getting Started
13
Getting Started
2. In the RecoverPoint login screen, log in as admin or monitor according to the predefined user on page 226 rules.
3. If:
l
14
this is your first time logging into Unisphere for RecoverPoint, The Getting Started
wizard on page 28 is displayed. Use the Getting Started wizard to add your
RecoverPoint licenses, enable support, and register your RecoverPoint system.
Getting Started
this is not your first time logging into Unisphere for RecoverPoint and a new
version of RecoverPoint is available The Upgrade Recommendation dialog box on
page 15 is displayed.
Results
When you are finished entering the required information into The Getting Started
wizard on page 28, Unisphere for RecoverPoint is displayed. Select RPA Clusters > RPACluster-Name > RPAs . Click the tab of each RPA cluster and ensure that a green checkbox
appears in both the Status and Connectivity columns of all RPAs at each RPA cluster.
MajorIf you must move to another major release to upgrade them. For example,
RecoverPoint 3.5, 4.0 and 4.1 are all different major releases of RecoverPoint, and
upgrading from one major release to another requires a major upgrade.
MinorIf they are in the same major release. For example, upgrading to any of the
service packs or patches of RecoverPoint 4.1 are all minor upgrades.
RecoverPoint version currently installed at the RPA cluster you are connected to.
RecoverPoint target versionThe target version is the most stable and current
RecoverPoint software code version across all major RecoverPoint releases. Best
practice is to ensure all RPA clusters in your RecoverPoint system are always running
the RecoverPoint target version.
You can enable or disable the display of the Upgrade Recommendation dialog box using
the Admin > System Notifications > System Reports and Alerts screen, by clearing or
marking the Enable New Release Notification checkbox. It is enabled by default.
If you connected to RecoverPoint using the management (floating) IP address, note the
relevant cluster name in the Upgrade Recommendation dialog box, as the dialog box is
displayed per RPA cluster.
15
Getting Started
Learn about EMC's Maintenance, Warranty Information and Parts Return Site.
EMC MatrixThe RecoverPoint EMC Simple Support Matrices (ESSMs) can be found
on EMCs E-lab Web site. E-Lab has tested and qualified millions of different data
center configurations and EMC solutions. To find out if your environment is qualified
for upgrade to the suggested target and recommended versions, download the
relevant RecoverPoint ESSM:
n
16
Getting Started
Licensing RecoverPoint
This section describes how to license new RecoverPoint purchases, and upgrade your
RecoverPoint license.
All RecoverPoint licenses are per array, an XtremIO cluster or an RPA cluster.
Licensing is enforced using the Locking ID.
You cannot add a volume that resides on an unlicensed array to a replication set.
Only volumes that reside on licensed arrays are displayed in the volume list. This
limitation does not exist for journal volumes or repository volumes.
For consistency groups containing both a local copy and a remote copy: If you select
to fail over to the remote copy and the remote RPA cluster does not have enough
licensed replication capacity for two times the capacity of the remote copy, the
failover will fail and you will be prompted to remove the local copy for the failover to
succeed.
When trying to add or modify a group, copy or replication set, the licenses of all
relevant arrays and RPA clusters are checked and the action will fail if it causes any of
the arrays or RPA clusters in the system to exceed their maximum licensed replication
capacity.
In RecoverPoint/CL:
n
Coexist on the same RPA cluster with RecoverPoint/CL licenses. If both are added
to the system, the RecoverPoint/EX license is disabled until the RecoverPoint/CL
license is removed.
17
Getting Started
of your purchased entitlements. A sales order can contain multiple LACs. In this case,
a separate LAC email is sent for each LAC contained in the sales order.
2. Click the Click here link in the LAC email to automatically access the RecoverPoint
licensing area of the EMC Online Support site and display all of the entitlements
associated with your LAC.
3. In the RecoverPoint licensing area of the EMC Online Support site, activate and
generate a License File for each entitlement. You will generate a separate license for
each RecoverPoint license model associated with each unique array or RPA cluster.
There is no special licensing model for virtual RPAs.
4. Install your license files on the RecoverPoint system through Unisphere for
RecoverPoint by selecting Admin > Manage Licenses, or by running the
add_license command in the RecoverPoint CLI.
Your LAC email(s) (or sales order numbers) to perform Step 1: Quickly access your
entitlements on page 20.
Access to EMC Online Support to perform Step 2 - Activate your entitlements on page
21.
If you do not have Unisphere for RecoverPoint installed, see the EMC RecoverPoint
Installation and Deployment Guide for installation instructions, and install
RecoverPoint before starting this procedure.
Existing EMC Online Support users; enter your EMC Support username and
password.
New EMC Online Support users; click Register Now and complete the registration
process.
2. Select Service Center > Get and Manage Licenses > R > RecoverPoint Family.
3. Click the Activate link in the RecoverPoint version 4.0 and later section to access the
EMC licensing portal.
18
Getting Started
4. In the LAC Request screen, click Manage Entitlements to display the Search
Entitlements screen:
19
Getting Started
Add raw capacity (for RecoverPoint/EX customers with VMAX 10K arrays with
registered capacity).
Add back-end array replication (for RecoverPoint/EX customers with VPLEX arrays).
In all of these cases, you will need to make a purchase with EMC sales, and obtain a
sales order. As soon as your sales order is approved, a LAC email is automatically sent to
the email addresses provided during order entry containing the LAC (License Authorization
Code) issued to you, validating your purchase and your entitlement(s).
20
Getting Started
A unique LAC is usually generated and emailed to you for each purchase, but this is not
always the case for evaluation licenses or purchases of certain products. Also, in some
cases (such as the addition of multiple arrays in RecoverPoint/EX), multiple LACs will be
generated and multiple LAC emails will be emailed to you.
To start the licensing process:
l
If you have your LAC email(s), for each LAC, click the Click here link in the LAC email
to automatically access the Powerlink licensing area of EMC Online Support, and
display all entitlements associated with the LAC. Then, perform Step 2 - Activate your
entitlements on page 21.
Note
If you do not have your LAC email on page 21, search your email inbox for email(s)
containing EMC License Authorization in the subject line. If you still cant find your LAC
email(s), contact EMC Worldwide Licensing Support at: https://
powerlinklicensing.emc.com/poeticWeb/session/license_request_emc.jsp
l
If you have your sales order number(s), Search for entitlements associated with a
sales order on page 18.
21
Getting Started
five screen wizard, that will guide you, step-by-step, through the process of turning your
LACs into license files (redeeming your entitlements).
Procedure
1. In the The Search Entitlements to Activate screen:
The link in the LAC email pre-populates the LAC field and searches for all entitlements
associated with the specified LAC. All relevant entitlements are displayed.
c. In the Search Machines dialog box, click Add a Machine. The Add Machine dialog
box is displayed.
d. In the Add Machine dialog box, enter a new machine name, and click Save.
A machine name is like a folder, it is used to group items together logically. A
unique machine name must be specified for each entitlement. Machine names can
22
Getting Started
be whatever unique name you choose but it is best practice to relate the machine
name to the Locking ID. For example, in RecoverPoint/SE and RecoverPoint/EX, the
Locking ID is an array serial number. Therefore, the machine name should be RPAPM00120701240 if APM00120701240 is the array serial number used for the
Locking ID. In RecoverPoint/CL, the Locking ID is the RPA Cluster ID, so the
machine name should be the RPA Cluster ID.
2. In the Register screen, verify the machine name, and click Next.
3. In the Activate screen, enter the Locking ID, and click Next.
The Locking ID is the field that is displayed under the Machine Information column;
its value is whichever entity the license is enforced to.
Depending on the entitlement, the Locking ID can be either an RPA Cluster ID (in
RecoverPoint/CL), or an array serial number (in RecoverPoint/SE and RecoverPoint/
EX). To display instructions for finding your RPA Cluster IDs and array serial numbers,
either click the Locking ID help link or see Find your RPA cluster IDs on page 293, Find
your XtremIO cluster IDs on page 293 and Find your array serial numbers on page
291.
4. In the Confirm screen, enter the email addresses of the recipients of the license file in
the Email to field of the Additional Email Options section, and click Finish.
By default, the customer contact provided during order entry and the user performing
the entitlement activation are automatically emailed an activation certificate
containing the license file as an attachment. You can enter multiple email addresses
in the Email to field. Separate multiple email addresses with commas. You can also
include optional comments which will be displayed in the certificate e-mail in the
Email comments field, or add optional notes which can only be viewed online in
Powerlink Licensing in the Notes for this transaction section.
23
Getting Started
5. In the Complete screen, click Save to File to download the license file and save the file
locally. The resulting license file has a *.lic extension and is in plain text format
(can be opened in any text editor).
6. Redo this procedure from Step 1: Quickly access your entitlements on page 20 for
each entitlement in each LAC email or sales order.
7. After you have turned all of your entitlements into license files, physically transfer the
license file(s) to the computer from which you will be running Unisphere for
RecoverPoint, so you can install them in the RecoverPoint system in the next step.
24
Multiple warnings will be issued before an expiring license is about to expire. After
license expiration, replication continues but no further operations will be allowed on
the RecoverPoint system.
The license limitations and their current values (for example, capacity, expiration) for
each licensed RPA cluster and storage array is displayed in the Dashboard > System
Limits pane.
Adding a new permanent or expiring license with the same Locking ID as an existing
expiring license replaces the existing expiring license.
Getting Started
After you have your license files, launch Unisphere for RecoverPoint as described in the
EMC RecoverPoint Installation and Deployment Guide.
When Unisphere for RecoverPoint loads for the first time The Getting Started wizard on
page 28 is displayed. The Getting Started Wizard will guide you, step-by-step, through
the process of installing your license file(s) in RecoverPoint and enabling RecoverPoint
support. If The Getting Started wizard on page 28 is not displayed, install your license
files using Manage Licenses on page 216 and Configure System Reports and Alerts on
page 264.
Call 24/7 License Key Live Support for North America, EMEA and APJK by dialing
1-800-782-4362, selecting option 4, and selecting option 4 again.
a. Go to http://support.emc.com
l
Existing EMC Online Support users; when prompted, enter your EMC Support
username and password.
New EMC Online Support users; click Register Now and complete the
registration process.
b. In EMC Online Support, click Service Center in the main toolbar, and then click
Create a Service Request.
c. Fill out the fields in the service request according to the instructions in the
following table:
Upgrade from RecoverPoint 4.0 or later
25
Getting Started
Field
Value
Service
Select Technical Problem/Question from the drop-down.
Request Type
Company and Product Information
Search by
Site ID
This is the geographical location of the data center for which you are
requesting the license. If you know the site ID, enter it in this field.
If you don't know the site ID:
Expand the Advanced Site Search.
Enter your company name and details.
Click Search.
Select the relevant site ID in the Search Results table.
Note
If you don't see your companys site ID in the list, contact EMC Customer
Support.
Product
Details
Version
Number
Select the version number of the EMC product that you want to upgrade
from the drop-down.
Contact Information
Initial
Contact is
Best Made
By
Select Email.
Primary
Contact
Name
Note
Note
If the email address/es listed under the primary contact name are incorrect
or missing, edit them to update the contact information.
Phone
If the phone numbers listed under the primary contact name are incorrect
or missing, edit them to update the contact information.
Problem Details
Problem
Severity
26
Getting Started
Field
Value
Problem
Summary
Problem
Description
All of the array serial numbers of the EMC arrays (VNX, VMAX, VPLEX,
etc.) that require RecoverPoint protection.
d. When youre done filling out the SR details, click the Submit button. An SR
Tracking number is displayed. Write this number down and save it for future
reference.
Note
In most cases, 48 hours after submitting your service request, your RecoverPoint
licenses will be emailed to the specified email address. If you have not received
your RecoverPoint licenses within a month from the time you submitted your
service request, contact EMC Customer Support.
2. Install your RecoverPoint license(s).
When Unisphere for RecoverPoint loads for the first time The Getting Started wizard on
page 28 is displayed. The Getting Started Wizard will guide you, step-by-step,
through the process of installing your license file(s) in RecoverPoint and enabling
RecoverPoint support. If The Getting Started wizard on page 28 is not displayed,
install your license files using Manage Licenses on page 216 and Configure System
Reports and Alerts on page 264.
Process
Americas
EMEA
APJ
Ordering
1-866-EMC-7777> Option 2
Presalessupportcenter@emc.com
Upgrades
1-508-249-5401
US number: +1-508-249-5401
License
Activation or
Installation
http://support.emc.com
Service Center > Create Service Request
27
Getting Started
Process
Americas
EMEA
APJ
licensing@emc.com
1-800-782-4362 > Option 4 >
Option 4
Welcome screen
The first time you access the Unisphere for RecoverPoint Management Application, the
Getting Started Wizard is displayed. To start protecting your data, in the Welcome screen,
click Next Add Licenses to go on to the Add Licenses screen on page 28.
Getting Started
The settings in the Add Licenses screen are displayed both through the Getting Started
Wizard the first time you launch Unisphere for RecoverPoint, and by selecting Admin >
Manage Licenses.
Procedure
1. Install a license on page 217.
2. Click Next Enable Support to go to the Enable Support screen on page 29.
29
Getting Started
Note
The settings in the Enable Support screen are displayed both through the Getting Started
Wizard the first time you launch Unisphere for RecoverPoint, and by selecting Admin >
System Notifications > Configure System Reports and Alerts.
Procedure
1. Configure system reports and alerts on page 266.
2. Ensure that system reports are configured correctly on page 268 by clicking the Test
Connectivity button.
Note
The connectivity test, if successful, sends a call home event (number 30999) to the
EMC Install Base and opens a Service Request with EMC Customer Support. If a
verification email is provided, EMC Customer Support sends an email to the entered
email address to verify that the system reports mechanism (SyR) has been
successfully configured.
3. Click Next Register RecoverPoint
Note
The settings in the Register RecoverPoint screen are displayed through both the Getting
Started Wizard the first time you launch Unisphere for RecoverPoint, and by selecting
Admin > Register RecoverPoint each subsequent time Unisphere for RecoverPoint is
launched.
Procedure
1. Register your RecoverPoint system on page 221.
2. Click the Finish button to close the Getting Started Wizard and apply your changes.
30
Getting Started
A dialog box is displayed allowing you to decide whether or not you would like to
display the Getting Started Wizard in subsequent RecoverPoint launches.
NOTICE
It is not recommended to select the checkbox in the pop-up until you have completed
the tasks of adding your licenses, enabling RecoverPoint support, and registering your
RecoverPoint system.
31
Getting Started
The Status Bar that consistently appears at the bottom of the interface displays the
numbers of alerts that are currently in the system, and their severity (for example, Alerts:
1 Critical, 3 Errors, 3 Warnings. When you click the status bar from any screen in the
application, you are redirected back to The RecoverPoint Dashboard on page 38.
2. In the Set Time Display dialog box, select the radio button of your preferred time
display option.
NOTICE
Local time is the local time at the RPA that Unisphere for RecoverPoint is connected to.
Results
The time display option you choose will be used by RecoverPoint when performing
operations which require a time stamp such as collecting system information and logging
events.
32
Getting Started
select one of the display languages that are built-into the current RecoverPoint
release from the Display Language combo-box.
click the Click here to update the display language files or help files of Unisphere
for RecoverPoint link to display the Change Unisphere for RecoverPoint Language
Web page.
33
Getting Started
Configuring replication
After you have completed the First steps in RecoverPoint on page 34, configure the
RecoverPoint system to start replication. The entire process is described step-by-step in
Protecting volumes on page 53.
System analysis
RecoverPoint contains intelligent System Analysis Tools on page 239 to help you make
your replication environment as efficient as possible.
RecoverPoint support
If you need support, use the Support on page 274 tab to easily access all of the
RecoverPoint support options on support.emc.com.
34
Getting Started
For troubleshooting issues, be sure to collet system information on page 247 before
contacting EMC Customer Support.
RecoverPoint support
35
Getting Started
36
CHAPTER 2
Dashboard
This section describes the RecoverPoint dashboard and how to use it to analyze and
monitor replication in RecoverPoint.
l
l
l
l
Dashboard
37
Dashboard
Option
When to use
Overall Health To graphically display an overview of the current status of the RecoverPoint
system.
System Limits
38
Dashboard
Overall Health
The Overall Health tab graphically displays an overview of the current status of the
RecoverPoint system. The overall health tab contains widgets that allow you to easily
monitor and analyze the current state of the system.
The Overall Health tab of the Dashboard contains the following widgets:
l
Alerts on page 42
Overall Health
39
Dashboard
The RPA clusters map displays the type of connection that exists between all RPA clusters
in the system. A dashed line represents an IP (WAN) connection and a solid line
represents a Fibre Channel (LAN) connection.
The RPA clusters map also displays the status of all major components in the system that
are seen by the RPA cluster, including; hosts, switches, storage devices, individual RPAs,
the LAN, and the WAN.
When the system detects a problem with one of these major components, the RPA
clusters map displays:
Table 3 RPA clusters map icons
Icon
Description
An error icon on each component that is not functioning properly.
A warning icon on each component that has warnings associated with it.
The status of a component, particularly until you have completed logging in to
the system, may also be Unknown. In that case, the icon is displayed on the
component.
Note
The errors and warnings in the RPA clusters map widget are also displayed in the
Alerts on page 42 widget.
Hover your cursor over an RPA cluster in the map to display a tooltip with the following
links:
40
Dashboard
Option
Description
Display Alerts
To display the Alerts dialog box containing the number of alerts registered by
the RPA cluster.
Click Details in the Alerts dialog box to display the alert texts.
Display RPA
To display the General Cluster Info on page 183.
Cluster Details
Multipath monitoring
When multipathing monitoring is active, the system analyzes network errors at the level
of individual paths, and generates a warning in the RPA Clusters Map whenever there is
not full redundancy between the RPA and splitters or volumes. Full redundancy is defined
as follows:
l
For RPA-to-volume links, there must be at least two distinct paths between each RPA
and volume; that is, each RPA has access to at least two storage WWNs (and
controllers, where relevant) via non-overlapping paths.
For RPA-to-splitter links, there must be at least two distinct paths between each RPA
and each splitter using different RPA ports and host (or switch) WWNs.
When RPA Multipath Monitoring is enabled, the system issues a warning upon logging in
regarding any existing links without full redundancy. In addition, warning events are
written to the log.
By default, multipath monitoring is active for all copies, for links both to storage and to
splitters.
To enable or disable RPA multipath monitoring, use the
config_multipath_monitoring CLI command.
Note
Multipath monitoring
41
Dashboard
Alerts
The Alerts widget provides a graphical overview of system health categorized by alert
level.
Figure 9 Alerts widget
Click the More details link at the bottom-right corner of the graph to display the alerts
table.
The alerts table contains system errors and warnings. The errors and warnings are
composed of messages from the System Limits screen, and other general system
warnings.
Figure 10 Alerts table
Hover over an error or warning in the table to display a tooltip containing the error or
warning properties.
When relevant, the dialog will show a severity, category, relevant RPA cluster, and
description of the error or warning.
Note
A system limit with a status of Critical equates to an Error in the alerts table. A system limit
with a status of Major or Minor equates to a Warning in the alerts table.
42
Dashboard
Click the Less details link at the bottom of the alerts table to close the alerts table and
display the Alerts widget.
System Traffic
The System Traffic widget provides a graphical overview of the amount of SAN and WAN
traffic passing through each RPA cluster.
Each consistency group and consistency group copy can be in any one of the following
transfer states:
Table 5 Transfer state
Transfer
State
Description
Active
43
Dashboard
Transfer
State
Description
Active
Data is being transferred synchronously to a copy.
(Synchronized
)
Paused
Data is not being transferred to a copy, because transfer has been paused by the
user.
Paused by
system
Data is not being transferred to a copy, because transfer has been paused by the
system.
Init (n%)
High-load
The system enters a permanent high-load state while data is being transferred to
a copy.
High-load (n
%)
The system enters a temporary high-load state while data is being transferred to
a copy.
Replicating
snap
Snap idle
N/A
Data is not being transferred to a copy, because the copy has been disabled by
the user.
The pie chart in the consistency group transfer status widget presents a breakdown of the
consistency groups in the system based on their current data transfer states, as follows:
l
Error (red)
Init (orange) - includes initializing, high load, and high load (n%)
Other (brown) - includes flushing, flushing buffer, flushing remote buffer to journal, and
unknown
Note
A consistency groups Transfer state on page 43 is determined by its most severe link
state. For example, in a RecoverPoint system that is replicating to two copies, if one link
is paused and one link is active, the transfer state will be set as paused.
If there are no consistency groups in the system, the chart will be replaced by the text No
consistency groups.
Hover your mouse over a transfer state in the chart to see the names of the consistency
groups in that state.
44
Dashboard
System Limits
The System Limits tab monitors important system values to let the user know how close
they are to their limits. The limits may be determined by the system, policies, licensing, or
limitations of external technologies.
Figure 13 Dashboard > System Limits tab
System
The following information is displayed in the System tab:
Table 6 System Limits > System tab
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its
limit.
Description
RPA Cluster
RPA
System Limits
45
Dashboard
Column
Description
Current Value of
Limit
Groups
The following information is displayed in the Groups tab:
Table 7 System Limits > Group tab
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Description
Group
Copy
Current Value
of Limit
Storage
The following information is displayed in the Storage tab:
Table 8 System Limits > Storage tab
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Description
RPA Cluster
Array
Current Value
of Limit
Splitters
The following information is displayed in the Splitters tab (not relevant to XtremIO, which
does not use a splitter):
Table 9 System Limits > Splitters tab
46
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Dashboard
Column
Description
Description
RPA Cluster
Splitter
Current Value
of Limit
System Events
The System Events tab displays the RecoverPoint event log which contains all events
logged by the RecoverPoint system, in the order that they are logged. A total of 9000
events can be displayed in the event log.
Figure 14 Dashboard > System Events
Display events
To display system events; select Dashboard > System Events tab.
The RecoverPoint event log is displayed, containing the last 9000 events logged in the
RecoverPoint system. Each event in the event log is displayed along with its relevant
event ID, summary, level, scope, point in time, RPA cluster, and topic.
System Events
47
Dashboard
Note
By default, only Normal scope events are displayed, but you can also Filter events on
page 48 to display Detailed events.
Sort events
To sort the events in the event log by ID, summary, level, scope, point in time, RPA
cluster, or topic, click on the relevant column header but you can also Filter events on
page 48 based on advanced criteria.
Filter events
Use the following procedure to filter the events in the System Events on page 47 log, and
save the settings for the current RecoverPoint user.
Procedure
1. Select Dashboardand click the System Events tab.
2. Click Filter Events. The Event Filter dialog box is displayed.
48
Setting
Values
From
The date and time (in GMT) from which events are to be displayed.
Select Unbounded to display the 9000 events preceding the date and time
specified in the To field.
To
The date and time (in GMT) until which events are to be displayed. Select
Unbounded to display all events up until the current date and time.
Dashboard
Setting
Values
Events to
Exclude
The IDs of the events that should not be displayed. Multiple event IDs can be
entered. Separate multiple event IDs with a comma.
Topics
The topic of the events to display in the event log. Valid values are:
Scope
Level
RPA cluster
Splitter
Consistency group
Management
RPA
Normal: To display only the root cause for an entire set of Detailed and
Advanced events. In most cases, these events are sufficient for effective
monitoring of system behavior.
Advanced: In specific support cases, EMC Customer Support may ask you to
display events in an Advanced scope. These events contain information that
is intended primarily for the technical support engineers.
Containing the Enter the terms that must exist in the event summary in order for the event to be
text
displayed in the event log. Use commas to separate multiple terms. Select:
l
Match all to display all events containing all of the specified terms in the
event summary.
Match any to display all events containing any of the specified terms in the
event summary.
Reset to
Default
To reset all of the settings in the Event Filter dialog box to their default settings.
OK
To close the Event Filter dialog box, and apply the specified settings.
Cancel
To close the Event Filter dialog box, without applying the specified settings.
49
Dashboard
Results
The event info that is copied to the clipboard is in the following format:
Summary: RPA is successfully communicating with its cluster.
Level: Clear
ID: 3000
Topic: RPA
Scope: Normal
Point in Time (GMT): 4/17/2013 8:46:35 AM
RPA Cluster: London
Description : RPA is successfully communicating with its
cluster(RPA2)
50
CHAPTER 3
Protection
This section describes how to protect volumes, and how to monitor and manage
protection and consistency.
l
l
l
l
l
RecoverPoint Protection........................................................................................ 52
Protect Volumes.................................................................................................... 53
Policy Templates................................................................................................... 68
Group Sets............................................................................................................ 73
Manage Protection................................................................................................ 78
Protection
51
Protection
RecoverPoint Protection
In Unisphere for RecoverPoint, data protection is guided by wizards, and performed
through the Protection menu.
52
Option
When to Use
Protect
Volumes
Policy
Templates
Group Sets
Manage
Protection
To manage and monitor existing consistency groups and their protection plans,
control transfer, or bookmark consistent points in time across groups and sets of
groups.
Protection
Protect Volumes
Use Protection > Protect Volumes to create consistency groups (CGs) to protect your
volumes. In RecoverPoint, CGs are used to configure protection policies, and set RPO and
RTO policies according to specific resource allocation and prioritization.
Protecting volumes
Creates a new enabled consistency group.
Before you begin
l
Ensure you have your RecoverPoint environment planning document describing the
groups and journals you will need to create, the volumes that you will need to define
in each, and the RPAs that will handle the data transfer. If you do not have this
document, contact your RecoverPoint account executive.
Your environment planning document should detail:
The number of consistency groups that you will need, and their names.
The priority of each consistency group with relation to the other groups in the
system.
Decide whether you will want to initialize the groups from a backup on page 280,
and prepare accordingly.
When a consistency group is first created, or a replication set is first added to the
system, the system automatically starts a first-time initialization process at the
Protect Volumes
53
Protection
copies (that is, synchronizing the copy volumes with the production volumes by
sending the complete image of each production volume to each copys storage).
Depending on the amount of data being transferred, this process can be both timeconsuming and bandwidth-consuming. To save time and bandwidth, you can
initialize the volumes from a backup as presented in First-time initialization is taking
too long on page 280 for this procedure).
l
If your hosts are part of a Windows clustered environment, see the First-time
failover section of the EMC RecoverPoint Replicating the Windows File System
Technical Notes for the specific procedure.
If your hosts are running on an AIX operating system, see the First-time failover
section of the EMC RecoverPoint Deploying with AIX Hosts Technical Notes for the
specific procedure.
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that copy
must be on the same array.
Ensure you have mapped all replication LUNs to RecoverPoint WWNs. Only the
volumes that are mapped and zoned to the RPA cluster are displayed in the available
volumes list in RecoverPoint.
Note
In RecoverPoint/SE only, all of the volumes of the VNX Series array are displayed in
the available volumes list.
l
Place all volumes that are resources of the host cluster in a single consistency
group. Simplify management by assigning the name of the host cluster as the
name of the consistency group.
Note
54
Assign each replication set the same name as its disk resource in the cluster. If all
cluster nodes (hosts) at the side are down, you may not be able to create
replication volumes. To correct this problem, either bring up the nodes, or run a
rescan_san command (from the CLI), with volumes=FULL.
Prior to enabling a consistency group, the system Dashboard may show an Error
on the source-side storage and display the message Volume cannot be accessed
by any RPA. The errors are removed when the consistency group is enabled.
There is a limit on the number of LUNs that are supported per storage group (see
the EMC RecoverPoint Release Notes for this limit).
If you need more LUNs than are currently available to support your replication sets
and journals, either because you have calculated your system needs or because
Protection
you have received a message that you have exceeded the maximum number of
supported LUNs, you may be able to create additional storage groups, according
to the procedure presented in Add more LUNs than allowed per VNX storage
group on page 290.
l
If any volume added is a device on a Symmetrix VMAX 10K, 20K or 40K array, refer
to Device Tagging in the EMC RecoverPoint Deploying with Symmetrix Arrays and
Splitter Technical Notes.
The same consistency group can contain volumes attached to multiple splitters.
The same consistency group can contain volumes using a VNX splitter to split
writes to one RPA cluster and volumes using a different splitter type to split writes
to a different RPA cluster.
The VPLEX consistency group name will only be displayed in the VPLEX Group
column of the volume list if you Attach volumes to the splitter on page 202 for the
VPLEX splitter (including certificate).
After you register your VPLEX storage, you will not be able to select VPLEX volumes
and non-VPLEX volumes in the same consistency group copy. It is recommended
that all volumes in a VPLEX consistency group be configured in a single
consistency group copy, and all volumes in a non-VPLEX consistency group be
configured in another consistency group copy.
To turn a MetroPoint group into a non-MetroPoint group, you can select the
groups standby production copy in the Manage Protection on page 78 screen,
and Remove a copy on page 123.
For replicating Oracle databases, see the instructions on how to replicate an Oracle
database, including using Oracle hot backup procedures with RecoverPoint
bookmarks for point-in-time snapshots and quick testing and disaster recovery in the
EMC RecoverPoint Replicating Oracle with EMC RecoverPoint Technical Notes.
Procedure
1. Select Protection > Protect Volumes.
2. In the Select Production Volumes screen:
a. Define the consistency group name, the production name, and the RPA cluster that
will manage the production.
Protecting volumes
55
Protection
Note
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array. Use the toolbar at the top-right corner of the
screen to help you identify the volumes.
Table 12 Toolbar options
Icon
Description
To filter the volumes in the list by Size, Product, Vendor, Name, UID, LUN,
or VPLEX Group.
Note
The VPLEX Group column is only displayed after you Attach volumes to the
splitter on page 202 for your VPLEX splitter.
To select the table columns that you want to display.
Note
You can also click and drag the column dividers to make the columns
wider or thinner. In most cases, RecoverPoint will remember the column
width that you define, and display the columns accordingly in each
subsequent launch of this wizard.
To export the data in the volume list to a *.CSV file.
56
Protection
Icon
Description
To display context-sensitive help for this wizard screen.
c. Optionally, click Modify Policies to define the group policies and copy policies
now, or skip this step and define the policies later.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is a
specific business need to set other policies.
d. Click Next Define the Production Journal.
3. In the Define Production Journal screen:
If the volume that you specified in the last step is not on a VNX/VNXe/CLARiiON array,
skip to step a on page 59
If the volume that you specified in the last step resides on a VNX/VNXe/CLARiiON
array that has already been registered in RecoverPoint, and a resource pool was
already registered for the same VNX/VNXe/CLARiiON array, the Journal Provisioning
Method screen is displayed.
Protecting volumes
57
Protection
Description
Journal size
Predicted
incoming
write-rate
Select this option and enter a value for predicted incoming writerate and required protection window to have RecoverPoint/SE
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to
sustain the entered values for predicted incoming write-rate and
the required protection window is dynamically updated in the
Calculated journal size field.
Required
protection
window
Note
Tiering Policy
The following information is displayed for each resource pool in the table:
58
Protection
Information
Description
Name
Type
RAID groups
Storage groups
Datastores
Total Size
Available Size
Tiers
Available Tiering
Policies
Storage Name
Serial Number
Array Type
IP
If there are Available Tiering Policies on storage, you can select a Tiering policy to
apply to the journal volume/s from the combo-box at the bottom of the resource
pool table now.
l
59
Protection
If you want to change the protection settings using policy templates, use the
Select Template drop-down to select one of your templates. Click Load to load
the settings in the template and click OK to apply the settings.
c. Click Next Add a Copy.
4. If you did not select the MetroPoint group checkbox in step 2, continue to step 5 on
page 60. If you did select the MetroPoint group checkbox in step 2, the Standby
Production screen is displayed. In the Standby Production screen:
a. Enter a name for the copy in the Standby production copy name field.
b. In the volume list, mark the checkboxes of each journal volume that you want to
use in your standby production journal.
Use the toolbar icons at the top-right corner of the screen to help you identify the
required volumes in the volume list. For best performance, select volumes that are
identical in size. If identically sized volumes are not available, select volumes that
are similar in size.
These are the copy journal volumes for the standby copy, not the copy volumes.
c. Optionally, click Modify Policy to define the journal policy now, or skip this step
and define the policies later from the Manage Protection screen.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is a
specific business need to set other policies.
If you want to change the protection settings using policy templates, use the
Select Template drop-down to select one of your templates. Click Load to load the
settings in the template and click OK to apply the settings.
d. Click Next Add a Copy.
5. In the Add a Copy screen:
60
Protection
a. Define the copy name, the RPA cluster that will manage the copy volumes, and the
replication mode on page 82.
For each production volume, click the Select volume link to add a volume to the
copy. The selected volume is the volume that the production volume is replicated
to.
The volume list is displayed. The volume list only contains volumes of sizes that
are equal to, or greater than, the specified production volume.
Note
If one volume in a copy is on an XtremIO array, all the volumes in the consistency
group at that copy must be on an XtremIO array. If the copy is on an XtremIO array,
it must be exactly the same size as all other copies in the consistency group. It
cannot be either larger or smaller.
Note
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped and
zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported VNX Series array are
displayed in the available volumes list.
Use the toolbar icons at the top-right corner of the screen to help you identify the
required volumes in the volume list. For best performance during failover, select
Protecting volumes
61
Protection
volumes that are the same size as the production volume. If volumes of the same
size are not available, select volumes that are as similar in size as possible.
NOTICE
You cannot proceed to the next step until the replication sets icon under the
volume list shows a green check mark to indicate that the number of replication
sets is equal to the number of production volumes.
b. Optionally, click Modify Policy to define the copy policies and link policies now, or
skip this step and define the policies later from the Manage Protection screen.
If you want to change the protection settings using policy templates, in the Link
tab, use the Select Template drop-down to select one of your templates. Click Load
to load the settings in the template and click OK to apply the settings.
Note
The Modify Policy link is only enabled after volumes are selected in the volume
list. You can set a copy policy for the production, however, the copy policy of the
production is only relevant after failover, when the production becomes a copy.
c. To continue configuring the group, click Next Define Copy Journal.
6. In the Define Copy Journal step:
If the copy volume that you specified in the last step is not on a VNX/VNXe/CLARiiON
array, skip to step a on page 65
If the volume that you specified in the last step resides on a VNX/VNXe/CLARiiON
array that has already been registered in RecoverPoint, and a resource pool was
already registered for the same VNX/VNXe/CLARiiON array, the Journal Provisioning
Method screen is displayed.
62
Protection
Description
Journal size
Predicted
Select this option and enter a value for predicted incoming
incoming write- write-rate and required protection window to have RecoverPoint
rate
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to
sustain the entered values for predicted incoming write-rate
and the required protection window is dynamically updated in
the Calculated journal size field.
Required
protection
window
Note
Tiering Policy
Protecting volumes
63
Protection
Option
Description
Back to Select
Production
Volumes
The following information is displayed for each resource pool in the table:
Information
Description
Name
Type
RAID groups
Storage groups
Datastores
Total Size
Available Size
Tiers
Available Tiering
Policies
Storage Name
Serial Number
Array Type
IP
If there are Available Tiering Policies on storage, you can select a Tiering policy to
apply to the journal volume/s from the combo-box at the bottom of the resource
pool table now.
When you are done configuring your journal settings, click Next Display Group
Summary.
l
64
Protection
The Modify Policy link is only enabled after volumes are selected in the volume
list.
c. Click Next Display Group Summary
7. In the Group Summary screen:
Protecting volumes
65
Protection
a. Use the following options until the consistency group diagram reflects your
requirements:
Table 13 Group summary screen
Action
Description
Edit
Opens the Add a Copy screen of the copy whose Edit link you clicked,
allowing you to edit the copy settings, and modify the copy volume
configuration, replication mode, or protection plan as described in
step 5 on page 60.
Delete
Removes the copy whose Delete link you clicked, from the consistency
group.
Note
Replication
Sets
66
Protection
Action
Description
Note
Start
replication
to all
copies in
group when
I click
'Finish'
When selected, starts transfer for the group as soon as the group is
created.
NOTICE
Add a Copy
Finish
Opens the Add a Copy screen, allowing you to create another copy, define
the new copys settings, and define the copys volume configuration,
replication mode, and protection plan.
Note
Before you start transfer to any copy, ensure that the copy volumes are
unmounted from any hosts and any volume groups are deported from the
logical volume manager (AIX, HP-UX, Windows, and Solaris have volume
managers built into the operating system; Veritas Volume Manager can be
used with any of these operating systems).
Creates the group, applies all of the specified settings, and starts a firsttime initialization process to synchronize the production volumes to the
copy volumes.
Before you click Finish, note the following:
l
Protecting volumes
67
Protection
Action
Description
the journal (which is more time-consuming but provides greater data
protection).
l
If your hosts are running on an AIX operating system, see the Firsttime failover section of the EMC RecoverPoint Deploying with AIX Hosts
Technical Notes for the specific procedure.
Policy Templates
Use Protection > Policy Templates to view or modify existing protection policy templates
or create new protection policy templates, for copies or links.
68
Name
Description
default copy
Protection
Name
Description
default remote Provides a practical configuration for remote link policies on page 83.
link
default local
link
2. You cannot remove the default policy templates, but you can create new ones on page
69 based on the default template settings and modify on page 70 any of the userdefined policy templates.
Only users with Group permissions can create new policy templates.
Use the Copy policy template to control your journal policies on page 87.
If a policy template contains an invalid value for an array, you will not be able to load
it to the array. For example, In XtremIO, if you select Enable Snapshot Consolidation
and then try to apply the template to copy on an XtremIO array, loading the template
will fail because snapshot consolidation is not supported on XtremIO arrays.
Procedure
1. In the list of policy templates, click Add.
69
Protection
When you modify a policy template, all settings based on the template do not
automatically change. You will need to re-load and apply the modified policy
template to use the new settings.
Use the Copy policy template to control your journal policies on page 87.
If a policy template contains an invalid value for an array, you will not be able to load
it to the array. For example, In XtremIO, if you select Enable Snapshot Consolidation
and then try to apply the template to copy on an XtremIO array, loading the template
will fail because snapshot consolidation is not supported on XtremIO arrays.
Note
You cannot modify any of the default policy templates on page 68.
Procedure
1. In the list of policy templates, select a template and click Edit. The Edit Policy
Template dialog box is displayed.
70
Protection
NOTICE
You cannot remove the default Copy and Link policy templates, and you cannot
change their settings. You can, however, create new policy templates and base them
on the settings of the default policy templates.
Procedure
1. In the list of policy templates, select a template.
2. Click Remove, and click Yes in the confirmation dialog box.
NOTICE
You cannot delete any of the default policy templates on page 68.
71
Protection
Define link and journal policies while adding a copy to an existing group
Procedure
1. Select Protection > Manage Protection
72
Protection
Group Sets
Use Protection > Group Sets to create or modify sets of consistency groups, perform
operational and recovery activities, and periodically bookmark the same consistent point
in time across volumes in multiple groups, simultaneously.
Note
Parallel bookmarks cannot be enabled for group sets containing consistency groups with
volumes that reside on an XtremIO array or a Data Domain.
73
Protection
Only users with Group permissions can add, edit or remove group sets.
The Enable, Disable, Start Transfer, and Pause Transfer buttons are only enabled if
they are relevant for at least one of the groups in the group set.
Procedure
1. Select Protection > Group Sets.
2. All of the group sets in the system are displayed, along with their system information.
74
Parallel bookmarks cannot be enabled for group sets containing consistency groups
with volumes that reside on an XtremIO array or a Data Domain.
Only users with Group permissions can add, edit or remove group sets.
You cannot create the group set if any of the groups that you want to include are
already part of another group set that has parallel bookmarking enabled.
Protection
You cannot create the group set if any of the groups that you want to include
contain links for which snap-based replication mode has been enabled.
You cannot create a group set if one of its groups is not replicating in the same
direction (that is, from the same source) as other groups in the group set.
Although groups with mixed topologies (that is, with a different number of copies)
can be included in the same group set, for recovery purposes, this is not
recommended.
Procedure
1. Select Protection > Group Sets .
2. Click Add. The Add Group Set dialog box is displayed.
Parallel bookmarks cannot be enabled for group sets containing consistency groups
with volumes that reside on an XtremIO array.
Edit a group set
75
Protection
Procedure
1. Select Protection > Group Sets .
2. Select a group set in the list of group sets.
3. Click Edit. The Edit Group Set dialog box is displayed.
Procedure
1. Select Protection > Group Sets .
76
Protection
The Enable and Disable buttons are only enabled if they are relevant for at least one
of the groups in the group set.
Procedure
1. Select Protection > Group Sets .
2. Select the group set from the list of group sets.
3. Click Enable or Disable.
The Start Transfer and Pause Transfer buttons are only enabled if they are relevant
for at least one of the groups in the group set.
Procedure
1. Select Protection > Group Sets .
2. Select the group set from the list of group sets.
3. Click Start Transfer or Pause Transfer.
To test a copy, undo writes, enable direct access or disable image access for all
consistency groups in a group set:
n
Select Protection > Group Sets. Select a group set from the list of group sets, click
Test Copies, and follow the instructions in Test a Copy on page 147.
Select Recovery > Test a Copy and follow the instructions in Test a Copy on page
147.
To test a copy and recover production of all consistency groups in a group set:
77
Protection
Select Protection > Group Sets. Select a group set from the list of group sets, click
Recover Production, and follow the instructions in Test a Copy and Recover
Production on page 160.
Select Recovery > Recover Production and follow the instructions in Test a Copy
and Recover Production on page 160.
To test a copy and fail over all consistency groups in a group set:
n
Select Protection > Group Sets. Select a group set from the list of group sets, click
Fail Over, and follow the instructions in Test a Copy and Fail Over on page 165.
Select Recovery > Fail Over and follow the instructions in Test a Copy and Fail
Over on page 165.
Manage Protection
Use the Manage Protection screen to manage and monitor your existing consistency
groups and their protection plans, control transfer, and mark consistent points in time
across groups and sets of groups.
When the Manage Protection screen is first displayed, the Consistency Groups node is
selected in the left pane, and the list of all consistency groups in the system is displayed
in the right pane along with the status of every consistency group in the RecoverPoint
system.
78
Protection
Column
Description
Name
Status
Transfer
The group transfer status (Paused, Active, Initializing, etc.). When a group is
configured to transfer data synchronously, the word Synchronized is displayed
next to the state of transfer.
Note
You can also see the data transfer state on page 43 of consistency groups
through the Consistency Group Transfer Status on page 43 widget in the
Dashboard.
Alerts
The number of alerts that have been logged for a group. If alerts have been
logged, click the link to display the alert texts.
Protected Size The size of the data that is being protected by the group.
Active RPA
Group Set
The group set name, if the group has been added to a group set.
You can also perform the following actions on multiple groups in the system
simultaneously, by clicking the relevant button at the bottom of the screen:
Table 16 Multiple consistency group actions
Button
Description
Cannot be undone.
Enable Group
Note
Only enabled if the selected consistency groups are disabled. Enables the
selected consistency groups.
Enabling a disabled consistency group starts replication and causes a full
sweep.
Disable Group
Only enabled if the selected consistency groups are enabled. Disables the
selected consistency groups.
Note
Disabling a consistency group stops all replication, deletes journals, and causes
a full sweep when the group is enabled.
Create
Bookmark
Create a bookmark and define snapshot policies across multiple groups on page
141, ensuring the same point in time can be identified across multiple
consistency groups.
Manage Protection
79
Protection
To perform this procedure on an AIX host, see the EMC RecoverPoint Deploying with AIX
Hosts Technical Notes for the correct procedure.
To perform this procedure on a Windows host, see EMC RecoverPoint Deploying with
Windows File System Technical Notes.
There are various advanced protection policies that cannot be accessed through
Unisphere for RecoverPoint, and can only be configured using the RecoverPoint CLI. See
the EMC RecoverPoint CLI Reference Guide for your RecoverPoint product version for more
information on these policies.
Group policies
The tables in this section describe the policy settings for consistency groups. To display
these settings, select Protection > Manage Protection, select a consistency group in the
left pane, and click the Group Policy tab in the right pane.
Table 17 Group policies
80
Setting
Description
Group Name
Primary RPA
The RPA that you prefer to replicate the consistency group. When the primary RPA
is not available, the consistency group will switch to another RPA in the RPA
cluster. Whether data will transfer when replication is switched to another RPA
Protection
Setting
Description
depends on the value of the transfer_by_non_preffered parameter of the
config_group_policy CLI command.
Note
Priority
Default = Normal
Only relevant for remote replication over the WAN or Fibre Channel, when two or
more consistency groups are using the same Primary RPA.
Select the priority assigned to this consistency group. The priority determines the
amount of bandwidth allocated to this consistency group in relation to all other
consistency groups using the same Primary RPA.
Possible values are: Idle, Low, Normal, High, and Critical
In asynchronous replication, groups with a priority of Critical are provided ten
times the priority of normal groups. Groups with a priority of High are provided
three times the priority of normal groups. Groups with a priority of Low are
provided 50% of the priority of normal groups. Groups with a priority of Idle are
provided 1% of the priority of normal groups.
Preferred
Cluster
Note
Distribute
group writes
across
multiple
RPAs
Default=disabled
Only supported if the journal is at least 40 GB.
Note
Both enabling and disabling this setting causes the journal of all copies in the
consistency group to be lost.
Distributed consistency groups across multiple RPAs to significantly increase the
maximum available RPA throughput, allowing for a significantly larger group. For
throughput performance statistics (during synchronous and asynchronous
replication) and feature limitations, see the EMC RecoverPoint Performance Guide.
When enabled, a minimum of one and a maximum of three secondary RPAs can
be selected.
Note
Before changing this setting, ensure all preferred RPAs (both primary and
secondary) are connected by Fibre Channel and can see each other in the SAN .
81
Protection
Setting
Description
External
Application
Default=none
Possible values are None and SRM.
Recovery
Copy
SRM: To enable support for VMware Site Recovery Manager. This option is
only valid if a RecoverPoint Storage Replication Adapter for VMware Site
Recovery Manager is installed on the vCenter Servers. For more information,
refer to the EMC RecoverPoint Adapter for VMware Site Recovery Manager
Release Notes.
Specifies which copy the external application should fail over to.
External
Only relevant for MetroPoint configuration and if External Application = SRM.
Management SRM supports only one production copy. When RecoverPoint is managed by
external management, the external management application (SRM) must be
Side
Managed by
When any value other than None is selected, Managed By is enabled and you
have the following options:
l
Link policies
The tables in this section describe the policy settings for the links between two copies.
To display these settings, select Protection > Manage Protection, select a consistency
group in the left pane, and click the Link Policy tab in the right pane.
82
Protection
Setting
Description
Copy 1
Copy 2
Asynchronous
Default=enabled
When enabled, RecoverPoint replicates the consistency group data in
asynchronous replication mode.
Snap
Replication
Default=disabled
When enabled, RecoverPoint replicates the consistency group data in
asynchronous, snap-based replication mode.
Possible values:
l
Periodic: A new snap starts after the specified interval has passed since
the previous snap was started. If the time interval has passed, but the
previous snap has not been finished, the next snap will start as soon as
the previous one is finished. Sets the interval between snaps to any
value between 30 and 1440 minutes. When set to Periodic, an interval
should be defined. The default interval is 30 minutes. The RPO will be
twice the specified interval, and cannot be changed.
Note
Synchronous
Note
Dynamic by
latency
Note
83
Protection
Setting
Description
Only relevant for synchronous replication mode.
When enabled, RecoverPoint uses dynamic sync mode and alternates
between synchronous and asynchronous replication modes, as necessary,
according to latency conditions (the number of milliseconds or microseconds
between the time the data is written to the local RPA and the time that it is
written to the RPA or journal at the remote site).
Dynamic by
throughput
Note
RPO
Default = 25 seconds
This setting defines the required lag of the each link in a consistency group,
and is set manually in MB, GB, writes, seconds, minutes, or hours.
In RecoverPoint, RPO starts being measured when a write made by the
production host reaches the local RPA, and stops being measured when the
write reaches either the target RPA or the target journal (depending on the
value of the transfer_by_non_preferred parameter of the
config_group_policy CLI command).
When the value of the regulate_application parameter of the
config_link_policy CLI command is set to no (default is no), the
specified RPO is not guaranteed. RecoverPoint will try its best to replicate
within the specified RPO without affecting host performance.
Compression
Note
84
Protection
Setting
Description
To compress data before transferring it to a remote RPA cluster. Can reduce
transfer time significantly.
Note
Only relevant for asynchronous remote replication. Both the enabling and
disabling of compression causes a short pause in transfer and a short
initialization. Compression decreases transfer time, but increases the source
RPAs CPU utilization.
Enable
Deduplication
High: Yields the highest bandwidth reduction ratio and requires the most
RPA resources.
Low: Yields the lowest bandwidth reduction ratio and requires the least
RPA resources.
Note
Snapshot
Granularity
Note
Fixed (per write): To create a snapshot for every write operation, over a
specific (local or remote) link.
Fixed (per second): To create one snapshot per second, over a specific
(local or remote) link.
85
Protection
Setting
Description
Note
Copy policies
Describes the policy settings for copies.
To display these settings, select Protection > Manage Protection, expand a consistency
group in the left pane and select one of its copies, and click the Copy Policy tab in the
right pane.
Table 19 Copy policies
Setting
Description
Copy Name
Host OS
Default = Other/Mixed
Select the operating system of the host writing to the volumes in the consistency
group. If the hosts are not all running the same operating system, select Others/
Mixed. If one or more of the volumes in the consistency group resides on an ESX
server, set as follows:
Maximum
Number of
Snaps
VMware ESX Windows -when running a guest Windows OS with a VNX splitter
VMware ESX -when running a guest OS other than Windows, with a VNX
splitter
Note
Clear journal
Note
upon
Only relevant in ProtectPoint
removal
Journal policies
Describes the policy settings for copy journals.
To display these settings, select Protection > Manage Protection, expand a consistency
group in the left pane, and select one of its copies. Then click the Copy Policy tab in the
right pane.
86
Protection
Setting
Description
Journal
Compression
Note
Maximum
Journal Lag
Note
RTO includes the time for trying to fix the problem without a recovery, the
recovery itself (RecoverPoint's role in an organization's RTO, which is
controlled by this setting), tests, and the communication to the users.
Decision time for users is not included.
When data is received by the RPA faster than it can be distributed to storage
volumes, it accumulates in the journal. The Maximum Journal Lag is the
maximum amount of snapshot data (in bytes, KB, MB, or GB) that is
permissible to hold in the copy journal before distribution to the copy
storage. In other words, the amount of data that would have to be distributed
to the copy storage before failover to the latest image could take place. In
terms of RTO, this is the maximum time that would be required in order to
bring the copy up-to-date with production.
When the Maximum Journal Lag value is reached, the system switches to
three-phase distribution mode, and no longer retains rollback information. As
soon as the lag is within the allowed limits, rollback data is retained again.
87
Protection
Setting
Description
Required
Protection
Window
Default = disabled
Note
Enable
RecoverPoint
snapshot
consolidation
Note
The consolidation times are not far apart enough for significant changes
to have occurred. There must be a least 1 GB of space between the
snapshots being consolidated.
Do not
Note
consolidate any
Not relevant in ProtectPoint or XtremIO.
snapshots for
at least
Default = 2 days
88
Protection
Setting
Description
Minimum = 12 hours.The period during which snapshot data is not to be
consolidated. The periods start time is always today, and the periods end
time is n hours / days / weeks / monthsago.
The following conditions apply:
Consolidate
snapshots that
are older than x
to one snapshot
per day for y
days
Note
Consolidate
snapshots that
are older than x
to one snapshot
per week for y
weeks
Note
89
Protection
Setting
Description
Note
The first weekly consolidation will fail unless there are at least seven
daily snapshots in the journal, in addition to the required number of
weekly snapshots and the specified unconsolidated duration. The first
monthly consolidation will fail unless there are at least four weekly
snapshots, or 28 daily snapshots in the journal in addition to the
required number of monthly snapshots.
90
Protection
The Status tab displays a graphical representation of the consistency group and copy
statuses. The following information is displayed:
Table 21 Status tab
Label
Displays
<Group
Name>
Running on
<RPA>
The group name and the RPA which is handling the group data, both of which can
be modified through the group policies on page 80.
<Copy Name>
at <Cluster
Name>
The relevant copy and RPA cluster names. The copy name can be modified
through the copy policies on page 86.
Replication
modes and
states
A dashed green line on top of a solid line means that the system is
replicating synchronously.
91
Protection
Label
Displays
Note
Role
The current role of the copy with regards to failover and regulation.
l
Storage
Image
When a group is selected in the left pane, you can click the buttons at the bottom of the
Status tab to perform the following actions:
Table 22 Status tab options when a group is selected
Button
Description
Apply
Bookmark
Create a bookmark and define snapshot policies for one group on page 140 by
displaying the Apply Bookmark dialog box and providing a bookmark name for
the current snapshot. When the snapshot is closed, it will be listed with the
bookmark name that you give it.
Add Copy
Displays the Add a copy on page 116 wizard, enabling you to add a copy to the
selected consistency group.
Test Copy
Displays the Test a Copy on page 147 wizard, enabling you to select and test a
copy of the selected consistency group.
Fail Over
Note
92
Recover
Production
Displays the Test a Copy and Recover Production on page 160 wizard, enabling
you to select and test a copy of the selected consistency group, and recover
production from it.
Start
Transfer
Only displayed if transfer is paused for the selected consistency group. Causes
the transfer of writes from the production host to all copies of the selected
consistency group to start.
Protection
Button
Description
Pause
Transfer
Only displayed if transfer is active for the selected consistency group. Causes the
transfer of writes from the production host to all copies of the selected
consistency group to pause.
Note
Best practice is not to use this command. Use Group policies on page 80 to set
policies for use of bandwidth. Pause transfer may be used when WAN bandwidth
is very limited and you wish to give the largest bandwidth possible to another
consistency group. In that case, you may temporarily pause transfer for lowerpriority consistency groups.
Disable
Group
Only displayed if the group is enabled for the selected consistency group.
Disables the selected consistency group.
Note
Disabling a consistency group stops all replication, deletes journals, and causes
a full sweep when the group is enabled.
Enable
Group
Only displayed if the group is disabled for the selected consistency group.
Enables the selected consistency group.
Note
Remove
Group
Cannot be undone.
93
Protection
The Total Traffic widget displays the total traffic that the consistency group data
generates on the RPA transferring the group data at the production and copy sites,
as well as between RPA clusters in your RecoverPoint system (in Mb/sec). The total
traffic includes the Initialization Traffic and the Application Traffic.
The Application Traffic widget displays the traffic that the consistency group
generates on the RPA transferring the group data at the production and copy sites,
as well as between RPA clusters in your RecoverPoint system (in Mb/sec). The
application traffic includes Incoming Writes as well as RecoverPoint replication
process traffic.
The Initialization Traffic widget displays the traffic that the consistency group
generates between copies and RPA clusters in your RecoverPoint system, during
consistency group initialization (in Mb/sec). Initialization traffic can be high, as
old writes are transferred between source and target copies to synchronize
between the production volumes and the copy volumes.
The Incoming Writes widget displays the writes to the production storage that the
consistency group generates at copies in your RecoverPoint system (in writes per
second), where each write is one I/O to the production storage.
94
Protection
The Bandwidth Reduction widget displays the ratio by which RecoverPoint was
able to compress the consistency group data that is transferred between RPA
clusters in your RecoverPoint system. The bandwidth reduction ratio includes both
data compression and deduplication.
Note
The Time Lag widget displays the lag of the selected consistency group (in
seconds), when transferring data between all local and remote RPA clusters in your
RecoverPoint system.
The Write Lag widget displays the lag of the selected consistency group (in writes),
when transferring data between all local and remote RPA clusters in your
RecoverPoint system. The write lag includes any writes generated by RecoverPoint
replication processes as well as internal RecoverPoint overhead.
The Data Lag widget displays the lag of the selected consistency group (in MB),
when transferring data between all local and remote RPA clusters in your
RecoverPoint system.
95
Protection
Enabling deduplication
Before you begin
l
Both the enabling and disabling of deduplication causes a short pause in transfer
and a short initialization.
Physical RPAs, running on a GEN4 or GEN5 hardware platform with at least 8GB of
RAM.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, click the Link Policy tab.
a. In the Select link to set policy diagram, select the relevant link.
b. In the Bandwidth Reduction section, if Compression is set to None, enable
compression by changing this value to Low, Medium, or High.
c. Check the Enable Deduplication checkbox.
4. Click the Apply button.
NOTICE
Display long-term deduplication statistics on page 97the user defines the period
in time for which to generate performance statistics.
Note
A bandwidth reduction or deduplication ratio value that is not significantly higher than 1
would indicate that the deduplication (and/or compression) process is not very effective.
If so, consider disabling these policies (as they do consume RPA CPU resources).
Protection
3. In the right pane; click the Statistics tab and click on the Replication Performance tab.
Note the performance statistics in the Bandwidth Reduction pane. The Bandwidth >
Reduction pane displays the current bandwidth reduction ratio, including
compression and deduplication.
1. To display the short-term effects of deduplication on your bandwidth through the
RecoverPoint CLI:
4. Run the get_group_statistics command.
5. Note the Current bandwidth reduction ratio and Average bandwidth reduction ratio
values. These values are the current (seconds) and average (minutes) bandwidth
reduction ratios, including compression and deduplication.
6. Note the Current deduplication ratio, and Average deduplication ratio values. These
values are the current (seconds) and average (minutes) bandwidth reduction ratios, of
only the deduplication process.
Both bottleneck detection and exporting consolidated statistics allows you to define the
period in time for which to generate long-term bandwidth reduction and deduplication
ratios.
You should:
n
Evaluate the importance and value of your consistency groups data in relation to
each other, and verify that the default values of the priority on page 81 setting (as
described in the following table) reflect your business objectives. If they do not,
contact EMC Customer Support and ask them to change the values.
Table 23 Priority setting default values
Setting Value
Idle
0.01 x Normal
Low
0.5 x Normal
Normal
Normal
High
3 x Normal
Critical
10 x Normal
97
Protection
Note
The lag is optimized only if the bandwidth is the cause of the lag. It is not relevant, for
example, if the lag is caused by the distribution process at the remote site (which can
happen when replicating over Fibre Channel).
The lag optimizer is only relevant for groups replicating asynchronously, that are not
experiencing a high load or an initialization. Groups replicating synchronously are
always prioritized over groups replicating asynchronously.
Procedure
1. Select Protection > Manage Protection
2. In the left pane, select a consistency group.
3. In the right pane, select the Group Policy tab
4. Specify the group Policy setting.
5. In the left pane, expand the group and select a copy.
6. Specify the copy RPO policy, according to your company's business objectives.
The snapshot granularity of all links in the consistency group can be set in the link
policies to no smaller than one second.
Journal loss will occur when modifying a groups topology (setting a non-distributed
group as distributed, or setting a distributed group as non-distributed).
When configuring journals for a distributed consistency group, keep the following in
mind:
All copies of distributed consistency groups must have journals that are at least
20 GB in size.
The recommended journal size for distributed groups with snapshot consolidation
enabled is at least 40GB.
If the capacity of an existing copy journal is less than the minimum journal size
required for distributed consistency groups (see the EMC RecoverPoint Release
Notes for this limit) the consistency group will need to be disabled and then
enabled again after you add journal volumes or change the size of a journal LUN
on storage
Enabling a disabled group causes a full sweep.
98
In Fibre Channel environments, make sure all of the RPAs at each RPA cluster are
connected to the SAN through a Fibre Channel switch, and zoned together so that
they all see each other in the SAN.
Protection
In iSCSI environments, make sure all RPAs are physically connected to each other
through their HBA Fibre Channel ports.
Note
In iSCSI configurations, there can be a maximum of two RPAs per RPA cluster
because two of the four existing Fibre Channel ports in the RPAs HBA are already
connected directly to the storage. If more than 2 RPAs per RPA cluster are
required, connect all of the RPAs in the RPA cluster through Fibre Channel
switches (two should be used for high availability) and zone them together.
If any of the primary or secondary RPAs associated with a consistency group becomes
unavailable, there will be a brief pause in transfer on all of the groups primary and
secondary RPAs, and all of the group segments will undergo a short initialization.
l
Under certain circumstances (for example, if one of the primary or secondary RPAs
becomes unavailable) two consistency group segments could be handled by the
same RPA.
l
In general, distributed consistency groups offer better performance than nondistributed (regular) consistency groups, as distributed groups run on a minimum of
two RPAs (one primary RPA and one secondary RPA). There is only a small
improvement in performance when a group is run on three RPAs. However, there is a
steep improvement in performance when a group is run on four RPAs.
l
The following are example journal configurations for distributed consistency groups:
n
One 40 GB volume + optional smaller volumes
n
Two 20 GB volumes + optional smaller volumes
n
Three 16 GB volumes + optional smaller volumes
n
Four 10 GB volumes + optional smaller volumes
Procedure
1. Review the relevant limitations and performance statistics of distributed groups in the
EMC RecoverPoint Release Notes
2. Select Protection > Manage Protection.
3. In the left pane, select a consistency group.
4. In the right pane, click the Group Policy tab
5. Check or clear the Distribute group checkbox. The Secondary RPA checkboxes are
enabled or disabled accordingly.
6. If you are enabling this feature, select one to three secondary RPAs, by checking the
relevant checkboxes in the Secondary RPA section.
Results
The group writes are distributed across the selected RPAs.
l
99
Protection
If the group is not distributed, only one RPA is specified in this area. You can also tell
which of all of your groups are distributed by navigating to Protection > Manage
Protection, clicking on Consistency Groups in the left pane and looking in the Active RPA
column of the consistency group table. Distributed consistency groups are displayed with
the text (primary) followed by a comma-separated list of numbers indicating the
designated secondary RPAs.
For groups that are not distributed, only one RPA is specified in this column.
You can connect to the RPA through either an HTTP or an HTTPS connection.
5. When prompted, log in to the RPA as one of the Pre-defined users on page 226 with
webdownload privileges.
6. In the browser, navigate to the following directory:
../info/long_term_stats
100
Protection
7. Download and unzip the long_term_stats.tar.gz file into a folder on your local
machine.
Results
The following table lists the statistics that are output by the
export_consolidated_statistics command. All statistics are valid for the sampled time
interval, that is, the difference between the time from and time to values on that row.
Table 24 Consolidated statistics output
Statistic
Unit of
measure
Description
MB/sec
IOs/sec
Non - initialization
output rate for link
MB/sec
Data synchronization
rate for link
MB/sec
Compression CPU
utilization
Percentage time in
transfer
% of time
Percentage time of
initialization
% of time
101
Protection
102
Statistic
Unit of
measure
Description
Group-Link utilization
Distributor receiver
regulation duration
% of time
Distributor phase 1
thread load
% of time
Distributor phase 1
effective speed
MB/sec
Distributor phase 2
thread load
% of time
Distributor phase 2
effective speed
MB/sec
Protection
Statistic
Unit of
measure
Description
value is dependent on the performance of the
journal and copy volumes.
l
Fast forward
distribution duration
% of time
Mb/sec
MB/sec
IOs/sec
Non - initialization
output rate for box
(average over all
period)
MB/sec
Data synchronization
rate for box (average
over all period)
MB/sec
103
Protection
104
Statistic
Unit of
measure
Description
Replication process
CPU utilization per
box
% of time
Box utilization
Mb/sec
MB/sec
IOs/sec
Non - initialization
output rate for site
(average over all
period)
MB/sec
Data synchronization
rate for site (average
over all period)
MB/sec
msec
Packet loss
% of
packets
Protection
The Status tab displays a graphical representation of the copy statuses. The following
information is displayed:
Table 25 Status tab
Label
Displays
<Group
Name>
Running on
<RPA>
The group name and the RPA which is handling the group data, both of which can
be modified through the group policies on page 80.
<Copy Name>
at <Cluster
Name>
The relevant copy and RPA cluster names. The copy name can be modified
through the copy policies on page 86.
105
Protection
Label
Displays
Replication
modes and
states
A dashed green line on top of a solid line means that the system is
replicating synchronously.
Role
The current role of the copy with regards to failover and regulation.
l
Storage
Image
When a copy is selected in the left pane, you can click the buttons at the bottom of the
Status tab to perform the following actions:
Table 26 Status tab options when a group is selected
Button
Description
Test Copy
Displays the Test a Copy on page 147 wizard, enabling you to test the selected
copy of the selected consistency group.
Fail Over
Note
106
Recover
Production
Displays the Test a Copy and Recover Production on page 160 wizard, enabling
you to test and recover production from the selected copy.
Start
Transfer
Pause
Transfer
Protection
Button
Description
Note
Best practice is not to use this command. Use Group policies on page 80 to set
policies for use of bandwidth. Pause transfer may be used when WAN bandwidth
is very limited and you wish to give the largest bandwidth possible to another
consistency group. In that case, you may temporarily pause transfer for lowerpriority consistency groups.
Disable Copy Only displayed if the selected copy is enabled. Disables the selected copy.
Note
Disabling a copy stops all replication, deletes journals, and causes a volume
sweep when the copy is re-enabled.
Enable Copy
Only displayed if the selected copy is disabled. Enables the selected copy.
Note
Remove
Copy
Controlling RTO
Describes how to set and monitor the RPO at a specific copy.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select a copy.
3. In the right pane, click the Copy Policy tab.
4. Control the part of RTO dedicated to data access using the Maximum journal lag
setting in the Journal policies on page 86.
Results
When the system approaches the value of Maximum journal lag, it moves to three-phase
distribution mode.
After you finish
To monitor the RTO:
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, click the Journal tab.
The value displayed in the Journal Lag field indicates the RTO in terms of data size.
Alternatively, run the get_group_statistics CLI command to display the journal
lag.
Monitoring and managing copies
107
Protection
Controlling RPO
Describes how to set and monitor the RTO at a specific copy.
Before you begin
Only relevant in asynchronous replication mode
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, click the Link Policy tab.
a. In the Select link to set policy diagram, select the relevant link.
b. In the Protection Settings, set the RPO policy and click the Apply button.
4. Control the RPO for each consistency group through the RPO setting in the group Link
policies on page 82.
Protection
You can also select Dashboard > System Limits, and then click on the Groups tab to
monitor the RPO of all consistency groups in RecoverPoint simultaneously.
In the RecoverPoint CLI, run the get_group_statistics command, and identify the
Lag output in the Link stats area.
109
Protection
Results
The following table describes the information displayed in the Journal tab of each copy.
Table 27 Copy journal tab
Info
Description
Current
Storage
Storage access status. The current condition of a volume at the copy storage can
be:
Journal Lag
Compression
Ratio
Amount of data (represented by snapshots) in the copy journal that has not yet
been distributed to the copy storage. The maximum journal lag setting defines
the current recovery point objective. In the event of a disaster, this is the
maximum amount of data loss that may be incurred.
Note
110
Compression is not relevant for the production journal (since the production
journal does not contain snapshots).
Compression impacts the CPU resources of the target RPA of the consistency
group, and can impact that RPAs ability to sustain its write-load. If the target
Protection
Info
Description
RPA of the consistency group for which you want to enable this option is also
transferring the data of other consistency groups across the WAN, note that
enabling this setting will affect the RPAs transfer rate. See the EMC
RecoverPoint Release Notes for throughput limitations.
Required
Protection
Window
Default = disabled
Indicates how far in time the copy image can be rolled back.
Current
Protection
Window
Indicates how far the copy journal can be rolled back. If the Required Protection
Window is defined, the Current Protection Window will be in one of the following
statuses (indicated in parentheses after the Current Protection Window):
Predicted
Protection
Window
Sufficient: Image can be rolled back far enough to meet the Required
Protection Window
Insufficient: Image cannot be rolled back far enough to meet the Required
Protection Window
Extending: Replication has not been running long enough to be roll backed
as far as the Required Protection Window.
If the Required Protection Window is not defined, the status will be N/A.
Systems prediction of the eventual size of the protection window. Note that
there is no guarantee on how long it will take to reach the predicted protection
window, and no guarantee that it will ever be reached (conditions may change
before it is reached).
If the Required Protection Window is defined, the Predicted Protection Window is
in one of the following statuses:
l
111
Protection
Info
Description
Consolidation
Type
Consolidation
Range
Progress
Stop
The image list in the copy Journal tab displays the following information:
112
Info
Description
Point in Time
Size
Size of snapshot.
Bookmark
Consistency
Protection
Info
Description
Note
Marking a snapshot as application-consistent does not create an applicationconsistent snapshot, it only tags the snapshot as application-consistent.
Snapshots marked as application-consistent have a higher probability of being
included in the snapshots displayed in the image list. If snapshot consolidation
is enabled, consider setting a Consolidation Policy of Never Consolidate for
snapshots that are marked as application-consistent.
Consolidation
Policy
6. In five-phase distribution mode, note the process steps labeled as Distributor phase
1 and Distributor phase 2, and note their performance statistics.
7. In three-phase distribution mode, note the process labeled Fast forward distribution
duration, and note the statistics.
Monitoring and managing copies
113
Protection
The total size of all snapshots between the specified start and end times must be at
least 1 GB.
Snapshots that account for 90% of the consolidation period must be available in
journal.
For example, for daily consolidation to take place, the starting and ending snapshots
must be at least 22 hours apart. Likewise, automatic consolidation will not take place
if the snapshots in the journal exceed 110% of the consolidation period. For
example, daily consolidation will not take place if the starting and ending snapshots
are more than 26 hours apart.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group and select a copy.
3. In the right pane, click the Copy Policy tab.
4. Select the Enable RecoverPoint Snapshot Consolidation checkbox to begin
consolidating the snapshots in your copy journal according to the default settings, or
adjust the settings to your specific requirements.
Results
Automatic snapshot consolidation begins according to the values set in the Copy Policy
tab, provided the system is in the distribution phase and initialization is over.
After you finish
To display the consolidation progress and space saved by the process:
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group and select a copy.
3. In the right pane, click the Journal tab.
114
Protection
Results
All of the Group policies on page 80 can be modified through the Group Policy tab.
115
Protection
Results
All of the Link policies on page 82 can be modified through the Link Policy tab.
If you have created Policy Templates on page 68, use the Select Template drop-down to
select a policy template. Click Load to load the template settings into the dialog box.
NOTICE
After loading a policy template, modify the Link policies on page 82 as required, and click
Apply to use the settings. The settings are not applied until the Apply button is clicked.
Remove a group
NOTICE
Remove one group by selecting the consistency group in the left pane, clicking the
Status tab, and clicking Remove Group.
Remove multiple groups by clicking Consistency Groups in the left pane, selecting
one or more groups in the right pane, and clicking Remove Group.
Add a copy
Use the following procedure to add a copy to an existing consistency group.
Before you begin
In the Add a Copy wizard:
116
The Cancel button closes the wizard and disables image access without creating the
copy.
The Finish button closes the wizard, creates the copy, and optionally, starts
replication to the new copy.
Protection
NOTICE
VPLEX Metro users can also use this procedure to turn a non-MetroPoint group into a
MetroPoint group.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, select the Status tab, and click Add Copy. The Add a Copy wizard is
displayed.
4. In the Add a Copy screen:
Note
This screen changes depending on whether or not VPLEX distributed volumes have
been mapped to RPA cluster at the production, and the group contains no remote
copies, or one remote copy.
l
If the there are VPLEX distributed volumes mapped to the RPA cluster at the
production, and the group contains no remote copies, or one remote copy, the Add
a Copy screen will contain two options for adding a copy.
If you are not a VPLEX Metro user or you do not want to turn a non-MetroPoint
group into a MetroPoint group, skip to the next bullet. If you are a VPLEX Metro
user, and want to turn a non-MetroPoint group into a MetroPoint group:
a. Select the Add Standby > Production Copy radio button.
b. Enter a name for the copy in the Standby production copy name field.
c. In the volume list, mark the checkboxes of each journal volume that you want
to use in your standby production journal.
Use the Toolbar options on page 56 at the top-right corner of the screen to help
you identify the required volumes in the volume list. For best performance,
select volumes that are identical in size. If identically sized volumes are not
available, select volumes that are similar in size.
These are the copy journal volumes for the standby copy, not the copy volumes.
117
Protection
d. Optionally, click Modify Policy to define the Journal policies on page 86 now, or
skip this step and define the policies later when you Modify a copys protection
policies on page 130.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is
a specific business need to set other policies.
If you want to change the protection settings using Policy Templates on page
68, use the Select Template drop-down to select one of your templates. Click
Load to load the settings in the template and click OK to apply the settings.
Note
This link is only enabled after volumes are selected in the volume list.
e. Click Next Display Copy Summary, and continue to Step 5 on page 213 on page
122.
l
If the groups production volumes are not VPLEX distributed volumes or the group
contains more than one remote copy, in the Add a Copy screen:
a. Define the copy name, the RPA cluster that will manage the copy volumes, and
the replication mode on page 82.
b. For each production volume, click the Select volume link to add a volume to
the copy. The selected volume is the volume that the production volume is
replicated to.
Note
118
Protection
Note
In VPLEX splitter environments, the VPLEX consistency group name will only be
displayed in the VPLEX Group column of the volume list if you Attach volumes
to the splitter on page 202 for the VPLEX splitter (including certificate). After
you enter VPLEX credentials, you will not be able to select VPLEX volumes and
non-VPLEX volumes in the same consistency group copy. It is recommended
that all volumes in a VPLEX consistency group be configured in a single
consistency group copy, and all volumes in a non-VPLEX consistency group be
configured in another consistency group copy.
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped
and zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported VNX Series array are
displayed in the available volumes list. See the appropriate technical notes for
your splitter for more information.
Use the toolbar options on page 56 at the top-right corner of the screen to help
you identify the required volumes in the volume list. For best performance
during failover, select volumes that are the same size as the production
volume. If volumes of the same size are not available, select volumes that are
as similar in size as possible.
NOTICE
You cannot proceed to the next step until the replication sets icon under the
volume list shows a green check mark to indicate that the number of
replication sets is equal to the number of production volumes.
a. Optionally, click Modify Policy to define the Copy policies on page 86 and Link
policies on page 82 now.
Modifying consistency groups
119
Protection
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is a
specific business need to set other policies.
If you want to change the protection settings using Policy Templates on page 68, in
the Link tab, use the Select Template drop-down to select one of your templates.
Click Load to load the settings in the template and click OK to apply the settings.
b. To continue configuring the group, click Next Define Copy Journal.
5. In the Define Copy Journal step:
If the volume that you specified in the last step is not on a VNX/VNXe/CLARiiON array,
skip to step a on page 121
l
If the volume that you specified in the last step resides on a VNX/VNXe/CLARiiON
array that has already been registered in RecoverPoint, and a resource pool was
already registered for the same VNX/VNXe/CLARiiON array, the Journal
Provisioning Method screen is displayed.
120
Option
Description
Journal size
Predicted
incoming
write-rate
Select this option and enter a value for predicted incoming writerate and required protection window to have RecoverPoint/SE
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to
sustain the entered values for predicted incoming write-rate and
the required protection window is dynamically updated in the
Calculated journal size field.
Protection
Option
Description
Required
protection
window
Note
When you are done configuring your journal settings, click Next Display Copy
Summary.
l
For applications running on a host cluster, the journal volumes must not be
resources of the host cluster.
In the volume list:
a. Select the volumes to add to the journal.
On XtremIO arrays, the journal does not need to be larger than 10 GB for nondistributed consistency groups, 40 GB for distributed consistency groups.
Use the toolbar options on page 56 at the top-right corner of the screen to help
you identify the required volumes in the volume list. For best performance,
select volumes that are identical in size. If identically sized volumes are not
available, select volumes that are similar in size.
b. Optionally, click Modify Policy to define the Journal policies on page 86 now.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is
a specific business need to set other policies.
Modifying consistency groups
121
Protection
If you want to change the protection settings using Policy Templates on page
68, use the Select Template drop-down to select one of your templates. Click
Load to load the settings in the template and click OK to apply the settings.
c. Click Next Display Copy Summary.
6. In the Copy Summary screen:
a. Select a copy to display its volume details and ensure the copy summary reflects
your anticipated copy configuration:
In RecoverPoint/SE:
l
If you selected to Automatically provision journal volumes based on a predefined Journal Size, the Journal Size is displayed at the bottom of the Copy
Summary screen.
b. Use the following options to create the copy, and optionally, start replication.
Action
Description
Start
replication
to copy
when I click
'Finish'
When selected, starts transfer to the copy as soon as the copy is created.
Finish
Creates the copy, applies all of the specified settings, and starts a firsttime initialization process to synchronize the production volumes to the
copy volumes.
Note
Before you start transfer to any copy, ensure that the copy volumes are
unmounted from any hosts and any volume groups are deported from the
logical volume manager (AIX, HP-UX, Windows, and Solaris have volume
managers built into the operating system; Veritas Volume Manager can be
used with any of these operating systems).
122
Protection
Action
Description
l
If your hosts are running on an AIX operating system, see the Firsttime failover section of the EMC RecoverPoint Deploying with AIX Hosts
Technical Notes for the specific procedure.
Remove a copy
Use the following procedure to remove a copy of an existing consistency group.
NOTICE
If you want to turn a MetroPoint group into a non-MetroPoint group, select the standby
production copy.
3. In the right pane; select the Status tab, click Remove Copy.
When a replication set is added to a consistency group all of the consistency group
volumes undergo a short pause in transfer and a short initialization, and a volume
sweep occurs on the newly added volumes.
123
Protection
The journal of all copies of the consistency group will be lost if:
n
All RPA clusters in your system are not running RecoverPoint 4.4 or later.
The initialization snapshot is too large for the capacity of the journal, triggering a
long initialization.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
3. In the right pane; select the Replication Sets tab, and click Add Replication Sets.
The Add Replication Sets wizard opens and the Select Production Volumes screen is
displayed.
4. In the Select Production Volumes screen:
a. Select your production volumes in the volume list.
Note
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array.
124
Protection
Use the toolbar options on page 56 at the top-right corner of the screen to help you
identify the volumes.
The VPLEX consistency group name will only be displayed in the VPLEX Group
column if you have entered the VPLEX storage credentials (including certificate).
When you enter VPLEX credentials, you will not be able to select VPLEX volumes
and non-VPLEX volumes in the same RecoverPoint consistency group copy. It is
recommended that all volumes in a VPLEX consistency group be configured in a
single RecoverPoint consistency group copy, and vice versa.
b. To continue configuring the replication set, click Next Select Copy Volumes.
5. In the Select Copy Volumes screen:
125
Protection
Note
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array.
Use the toolbar options on page 56 at the top-right corner of the screen to help you
identify the required volumes in the volume list.
For best performance during failover, select volumes that are the same size as the
production volume. If volumes of the same size are not available, select volumes
that are as similar in size as possible.
You cannot go on to the next step until the Replication sets icon under the volume
list shows a green check mark to indicate that the number of Replication sets is
equal to the number of production volumes.
b. When you are done selecting the volumes at each copy, click Next Review
Replication Sets.
6. In the Review Replication Sets screen:
126
Protection
a. Select a row in the replication sets table in the top section to display the
associated volume information in the bottom section.
b. Click on the replication set name to open the Edit Replication Set dialog box.
When you add a new replication set to an existing consistency group, RecoverPoint
ensures consistency between the new copy volume(s) and their production
source(s) by performing a volume sweep on all of the volumes in the new
replication set. Selecting the Attach as Clean checkbox overrides the default
synchronization process by informing the system that the new copy volumes are
known to be an exact image of their corresponding production volumes. If Attach
as Clean is checked, and the new copy volumes are inconsistent with their
corresponding production volumes, they will remain inconsistent. To ensure
consistency, best practice is not to use this option and allow the default
RecoverPoint synchronization process to ensure consistency between the new
copy volumes and the production.
7. Click Finish.
127
Protection
When a replication set is removed from a consistency group, all copy journals are
lost, and all of the consistency group volumes undergo a short pause in transfer and
a short initialization.
If the replication set is removed during a long initialization, the consistency group will
undergo a full sweep.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
Enabled consistency groups must contain at least one replication set. If you want to
remove all of the replication sets in the group, click the Status tab and then click
Disable Group now.
3. In the right pane:
a. Select the Replication Sets tab.
b. Select one or more replication sets to remove.
Note
Clicking on a cell in any of the copy columns displays the relevant volume
information in the bottom pane.
4. Click Remove Replication > Set and click yes in the confirmation dialog boxes.
If you disabled the group after step 1 on page 128, select the Status tab and click
Enable Group now.
NOTICE
All copy journals are lost, and all of the consistency group volumes undergo a short
pause in transfer and a short initialization.
Pause transfer
Use the following procedure to pause transfer between production and all group copies.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
3. In the right pane; select the Status tab, click Pause Transfer, and click yes in the
confirmation dialog box.
Start transfer
Before you start transfer to any copy, ensure that the copy volumes are unmounted from
any hosts and any volume groups are deported from the logical volume manager.
Use the following procedure to start transfer between production and all group copies.
128
Protection
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
3. In the right pane; select the Status tab, click Start Transfer, and click yes in the
confirmation dialog box.
Disable groups
Use the following procedure to disable one or more enabled consistency groups.
Note
Disabling a group stops replication, deletes all copy journals, and causes a full sweep on
all copies in the group when the group is re-enabled.
Procedure
1. Select Protection > Manage Protection.
2. Disable the group(s):
l
To disable one group, select the group in the left pane, click the Status tab, and
click Disable Group.
To disable multiple groups, click Consistency Groups in the left pane, select one or
more groups in the right pane, and click Disable Group.
Enable groups
Use the following procedure to enable one or more disabled consistency groups.
Note
Enabling a consistency group automatically starts transfer. Before you start transfer to
any copy, ensure that the copy volumes are unmounted from any hosts and any volume
groups are deported from the logical volume manager.
Procedure
1. Select Protection > Manage Protection.
2. Enable the group(s):
l
To enable one group, select the group in the left pane, click the Status tab, and
click Enable Group.
To enable multiple groups, click Consistency Groups in the left pane, select one or
more groups in the right pane, and click Enable Group.
NOTICE
Modifying copies
Use the Manage Protection screen to:
l
129
Protection
Results
All of the Copy policies on page 86 and Journal policies on page 86 can be modified
through the Copy Policy tab.
If you have created Policy Templates on page 68, use the Select Template drop-down to
select one of them, and click Load to load their settings into the dialog box.
NOTICE
After loading a policy template, modify the Copy policies on page 86 and Journal
policies on page 86 as required, and click Apply to use the settings. The settings are not
applied until the Apply button is clicked.
Remove a copy
Use the following procedure to remove a copy of an existing consistency group.
NOTICE
Protection
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group, and select the copy.
3. In the right pane; select the Status tab, click Remove Copy, and click yes in the
confirmation dialog box.
Pause transfer
Use the following procedure to pause transfer between production and a copy.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Pause Transfer, and click yes in the
confirmation dialog box.
Start transfer
Before you start transfer to any copy, ensure that the copy volumes are unmounted from
any hosts and any volume groups are deported from the logical volume manager.
Use the following procedure to start transfer between production and a copy.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Start Transfer, and click yes in the
confirmation dialog box.
Disable a copy
Disabling a copy stops replication, deletes the copy journal, and causes a volume sweep
when the copy is re-enabled.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Disable Copy, and click yes in the
confirmation dialog box.
Enable a copy
Enabling a copy automatically starts transfer.
Before you begin
Before you start transfer to any copy, ensure that the copy volumes are unmounted from
any hosts and any volume groups are deported from the logical volume manager.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Enable Copy, and click yes in the
confirmation dialog box.
Modifying copies
131
Protection
NOTICE
Modifying links
To modify the protection policy of the links between existing consistency group copies:
Procedure
1. Select Protection > Manage Protection.
2. Select the consistency group in the left pane
3. In the right pane, click the Link Policy tab.
Results
All of the Link policies on page 82 can be modified through the Link Policy tab.
If you have created Policy Templates on page 68, select a link in the diagram and use the
Select Template drop-down to select a policy template. Click Load to load the template
settings into the Link Policy dialog box.
NOTICE
After loading a policy template, modify the Link policies on page 82 as required, and click
Apply to use the settings. The settings are not applied until the Apply button is clicked.
132
Protection
a. Click the blue link next to the name of the RPA cluster containing the volume you
want to replace. The Select Volumescreen is displayed.
133
Protection
Note the production volume specified in the Production volume area at the top of
the screen.
b. From the Volumes list, select the volume to which you want to replicate the
specified production volume.
NOTICE
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array. The volume list only displays volumes at the RPA
cluster that are equal to, or greater than, the specified production volume. For best
performance during failover, select a volume that is the same size as the
Production volume. If a volume of the same size is not available, select a volume
that is as similar in size as possible.
c. Click OK to return to the Edit Replication Set dialog box.
d. Click OK to apply the new replication set volume configuration, and click yes in the
confirmation dialog.
NOTICE
Data transfer is briefly paused for the group, and a volume sweep occurs on the
new volume(s) when data transfer is enabled again.
Dynamic LUN resizing on page 135, which does not result in a full sweep.
Non-dynamic LUN resizing on page 136, which does result in a full sweep.
NOTICE
You cannot Resize volumes in a replication set on page 134 that are based on thick
LUNs while snap-based replication is enabled. Disable snap-based replication before
you Resize volumes in a replication set on page 134 that are based on thick LUNs.
134
Protection
All volumes should be resized at the same time and to the same size. If they are not
the same size, the allocated LUNs will not be fully utilized.
After resizing the volumes in a replication set, virtual image access with roll will not
be allowed to a point-in-time before the volume was resized. Virtual image access
(without roll) and logged (physical) image access to a point-in-time before the
resizing are supported.
Procedure
1. On the VNX/VNXe array (in Unisphere), resize the LUNs:
a. Click the LUN tab.
b. Select the copy LUN or LUNs, right-click on the LUN name, select Expand, and enter
the new size.
The final size of all LUNs in the replication set should be exactly the same.
c. Select the production LUN, select Expand, and enter the new size.
Once the LUNs have been resized, RecoverPoint will fake the sizes (as if they were
still the old sizes). Replication continues using the faked sizes.
2. In Unisphere for RecoverPoint, select Protection > Manage Protection.
3. In the left pane, select the consistency group.
4. In the right pane; select the Replication Sets tab, select the replication set, and click
Edit Replication Set to display the Edit Replication Set dialog box.
5. Click the blue link of the copy whose volume you want to resize. When prompted,
confirm that you wish to resize.
RecoverPoint runs SAN discovery on the new volumes and starts a short initialization
of the expanded areas. It may take a few minutes for RecoverPoint to correctly display
the new sizes of volumes.
After resizing the volumes in a replication set, virtual image access with roll will not be
allowed to a point-in-time before the volume was resized. Virtual image access
(without roll) and physical image access to a point-in-time before the resizing are
supported.
Modifying replication sets
135
Protection
6. Make any necessary updates in hosts and applications (such as re-scanning the SAN).
Modifying journals
There are two ways to change the storage capacity of an existing journal:
l
Add or edit journal volumes on page 136; this process does not trigger a full sweep
synchronization, nor does it erase all history in the existing journal. After this
procedure, the copy can still be rolled back to a previous point-in-time.
Change the size of a journal LUN on storage on page 137; this process does trigger a
full sweep synchronization, and it does erase all history in the existing journal. After
this procedure, the copy cannot be rolled back to a previous point-in-time.
In RecoverPoint/CL and RecoverPoint/EX only: Only the volumes that are exposed to
the RPA cluster are displayed in the available volumes list. If the required volumes
are not in the available volumes list, mask the LUNs to RecoverPoint WWNs, and click
the Rescan button to update the list of available volumes.
In RecoverPoint/SE, all of the volumes of the supported VNX Series array are
displayed in the available volumes list.
For best performance, select volumes that are identical in size. If identically sized
volumes are not available, select volumes that are similar in size.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group, and select a copy.
136
Protection
c. Mark the checkboxes of the volumes that you want to add to the journal.
Clear the checkboxes of the volumes that you want to remove from the journal.
Multiple volumes can be selected.
d. Click OK.
After you finish
If you performed this procedure to enlarge the journal capacity after distributing the
writes of this consistency group across multiple RPAs, disable and then re-enable this
group to trigger a full sweep.
This ensures that all writes up until the latest image are transferred from the copy
journal to the copy storage, and only the host writes from that point forward will
need to be synchronized at the end of this procedure.
2. In RecoverPoint, disable the copy and remove the journal volume(s). Select Protection
> Policy Templates (see Policy Templates on page 68):
Modifying journals
137
Protection
a. In the left pane, expand the group that the journal volume belongs to and select
the copy.
b. In the right pane; select the Journal tab, and click Edit Journal > Volumes. The Edit
Journal Volumes dialog box is displayed.
c. Clear the checkbox of the journal volume whose size you want to change and click
OK. The journal volume is removed from the RecoverPoint system.
3. At the copys SAN, dedicate more storage resources to the required LUN(s).
4. In RecoverPoint, click Edit Journal Volumes .
The RecoverPoint SAN discovery utility automatically detects the change in the
physical size of the volume.
5. Select the resized LUN(s).
6. Click the OK button to apply the changes and exit the dialog box.
7. In the right pane, select the Status tab.
8. Select Recovery > Manage Recovery (see Manage Recovery on page 173), and select
Finish Testing in the Select Next Action combo box of the copy containing the
expanded journal volume(s).
NOTICE
Data transfer is briefly paused for the group, and a short initialization may occur, but
only the writes that occurred after image access was enabled to the copy will be
synchronized.
Modifying snapshots
All of the points in time (snapshots) created by RecoverPoint are crash-consistent by
default. You can set or modify one or more snapshots' default policies by using the
following procedures:
138
Create a bookmark and define snapshot policies for one group on page 140
Protection
Note
Create a bookmark and define snapshot policies across multiple groups on page 141
Use KVSS to Create and mark an application-consistent point in time on page 142.
The snapshot settings and policies are:
Table 30 Snapshot policies
Setting
Description
Bookmark
Mark as
The two possible values for this field are Application-Consistentand CrashConsistent. All snapshots are Crash-Consistent by default. Select ApplicationConsistentfrom the drop down if the selected snapshot is known to be
application-consistent.
Selecting Application-Consistent does not create an application-consistent
snapshot, it only tags the snapshot as application-consistent.
Note
Define a
Consolidation
Policy for this
Snapshot
Note
Modifying snapshots
139
Protection
Setting
Description
Note
Define a
Retention
Policy for this
Snapshot
Note
4. In the Snapshot Policy dialog box, enter or modify any of the snapshot policies on
page 139 and click OK.
You can only bookmark a snapshot in a consistency group that is enabled and
actively transferring.
Latest is a reserved term and therefore cannot be used when marking snapshots.
Use the following procedure to change a snapshots settings and policies across all
volumes in a group.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane; select the Status tab, and click Apply Bookmark. The Apply
Bookmark dialog box is displayed.
140
Protection
All RecoverPoint snapshots are crash-consistent. Use KVSS to create applicationconsistent on page 142 snapshots.
You can only bookmark a snapshot in a consistency group that is enabled and
actively transferring.
Latest is a reserved term and therefore cannot be used when marking snapshots.
When applying a bookmark to multiple groups in parallel, the system creates a bookmark
with the same name, snapshot policy, and consistency tag at a similar point in time on
each of the relevant consistency group volumes.
Note
This procedure does not create parallel bookmarks. To create parallel (consistent)
bookmarks at pre-defined intervals, create a group set on page 74.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select Consistency Groups.
3. In the right pane; select two or more consistency groups, click Create Bookmark.
141
Protection
You can use the vssadmin list writers command to obtain a list of registered
writers on the host machine.
You can use the kvss.exe list command to display the components of each of
the writers found using the vssadmin list writers command.
You can run the kvss.exe set_credentials command once per Windows user
to define the ip, user and password. After doing so, you will not need to enter these
values again.
Multiple writers and groups can be entered simultaneously if they are separated by a
space.
To use KVSS in a Microsoft Cluster Server environment with Symmetrix DMX storage, the
SPC-2 flag must be enabled on the Symmetrix ports.The syntax is as follows:
kvss.exe bookmark
bookmark=<bookmark_name>
writers=<writer_name> <writer_name>
[groups=<group_name> <group_name>]
[consolidation_policy=never|survive_daily|survive_weekly|
survive_monthy|always]
[type=[FULL|COPY]]
[ip=<RecoverPoint_cluster_management_ip_address>]
[user=<RecoverPoint_username>]
[password=<RecoverPoint password>]
142
Protection
Note
consolidation_policy = consolidation policy to set for this snapshot. Valid values are:
n
type =The shadow copy type: either FULL or COPY. This setting is optional. The default
is COPY. The settings full and copy are implemented by the writer application.
Generally, when type = full,backup logs are truncated; when type = copy, backup logs
are not truncated.
Modifying snapshots
143
Protection
To create a bookmark every subsequent time for a Microsoft Exchange application after
defining the ip, user, and password through the kvss.exe set_credentials
command:
kvss.exe bookmark
writers="Microsoft Exchange Writer"
groups="exchange\comp1" exchange\comp2
bookmark="exchange hourly snapshot"
consolidation_policy=survive_daily
144
CHAPTER 4
Recovery
This section describes how to test copies, recover from disasters, and migrate to a
different storage system.
l
l
l
l
l
Recovery
145
Recovery
RecoverPoint Recovery
In Unisphere for RecoverPoint, data testing and recovery is guided by wizards, and
performed through the Recovery menu. Before you begin the following procedures, you
should be well acquainted with the concept of RecoverPoint recovery and the role that
copies, journals, and snapshots play in it. Recovery activities can be performed on both
consistency groups and group sets.
NOTICE
Option
When to Use
Test a Copy
Displays the Test a Copy wizard to guide you through the process of selecting
and accessing a copy image, and testing the selected image.
Test a Copy
and Recover
Production
Test a Copy
and Fail Over
To ensure that your copies can be used to restore data, recover from
disaster, or seamlessly take over production.
Displays the Recover Production wizard to guide you through the process of
selecting and accessing a copy image, verifying the image, and using a copy
journal to roll the production storage back to a previous point in time to correct
file or logical corruption.
Note
146
Recovery
Option
When to Use
l
Note
Manage
Recovery
To display all of the images that are currently being accessed in the
RecoverPoint system, continue testing, monitor, or continue recovery activities
for consistency groups or a group set.
Test a Copy
Describes the RecoverPoint procedure for accessing and testing copy images.
In RecoverPoint, image access is designed to allow for the brief verification, backup,
cloning, or data analysis of a copy, before failover or production recovery.
Note
You can also access the Test a Copy wizard when Monitoring and managing groups on
page 91, Monitoring and managing copies on page 105, or you can Initiate recovery
activities for a group set on page 77.
Test a Copy
147
Recovery
For added protection, back up the copy image. In XtremIO this is not required as
image access works on a copy of the volume snapshot.
If you need more time to test than your image access log or journal will allow, you
can:
Click Cancel to disable image access and exit the wizard. Click Cancel only when
you are done testing and don't plan to run any further tests on the copy in the near
future. After you click Cancel, RecoverPoint will disable image access and use the
information in the image access log to automatically undo any writes made to the
copy while image access was enabled.
NOTICE
Click Save & Close to exit the wizard without disabling image access and display
the Manage Recovery screen without starting the recovery activity. Use Save &
Close if you have a test plan running and you want to exit the wizard now but keep
image access enabled and return to testing later.
The warning The requested operation will be performed on all of the groups in the
group set excluding the groups listed above.is displayed to the user for a group in
the group set when the requested activity is illegal for one or more groups in the
group set. A recovery activity is legal for a group at a target cluster only if the
group is enabled, and the action is legal for one or more copies of the group.
When this warning is displayed, note that the requested action will not be
performed for the listed groups.
If an action that is part of a recovery activity fails for one or more of the groups in a
group set, you may want to manually perform the action for each group on which
the action failed in order to bring all of the group set's groups to the same
recovery state.
148
Recovery
the first groups image and queries the rest of the groups in the group set
according to the first groups parameters.
When selecting a specific point in time by entering advanced search options,
the same image search query is sent for all groups in the group set (not
supported in XtremIO).
Procedure
1. Select Recovery > Test a Copy.
2. In the Select a Copy screen:
a. Select either a consistency group or a group set by marking the appropriate radio
button and selecting an item from the list.
l
If you selected a consistency group, select a non-production copy from the list
of copies or the copy diagram.
While selecting a copy, you can use the diagram to identify the state of data
transfer between the production and all copies in the group. The direction of
replication and type of replication are both illustrated.
Asynchronous replication is represented by a dashed line, while synchronous
replication is represented by a dashed line on top of a solid line.
Place your icon over any copy icon to display a tooltip with the copy Role, the
Storage state, and the state of Image access.
l
If you selected a group set, select a target RPA cluster from the list. When a
group set is selected, the table under the list of target RPA clusters can be used
to identify the direction of replication and number of copies in each group.
149
Recovery
a. Select the copy image that you want to access. To test the image, you may want to
start with the last image known to be valid. To analyze data, you generally want the
latest image.
Table 32 Select an Image screen
150
Setting
Description
The latest
image
The last snapshot that was created at the production, and transferred to
the copy journal. This is the image at the top of the image list and the
most current snapshot sent from production.
An image
from the
image list
Opens a list of images in the copy journal, and enables you to easily
identify and select an image from the list by point in time, snapshot size
(or the delta between the selected snapshot and the snapshot before it),
bookmark, consistency, and consolidation policy.
Recovery
Setting
Description
Note
Use the toolbar icons to manage and filter the image list.
A specific
point in time
or bookmark
The system constantly adds new snapshots to the image list and
discards others in order to maintain the display limit. This is done by
snapshot dilution, a priority selection algorithm in which
bookmarked images receive precedence over other images.
Note
Exact: Searches for a bookmark that contains the exact text entered
in the Bookmark field.
Image Type: Searches for the specified image type with the
specified bookmark name.
Max Range: Searches for an image that was created the specified
number of minutes/hours before and after the specified Point in
Time. Not supported on XtremIO arrays.
Select the required Image access mode. Virtual Access without roll image in
background is preferred. However, if you need to test images for a longer period of
time or need maximum performance while testing, select Virtual Access and check
the Roll to image in background checkbox, or select Logged Access.
Note
XtremIO supports only logged image access mode, accessing the selected pointin-time is instantaneous, there are no time or space limits on image access,
replication and distribution continue during image access, and the journal is not
affected.
151
Recovery
Setting
Description
Logged
Access
An image access mode that physically rolls the copy storage to the
selected image (bookmark, or point in time).
Use Logged Access if you need to:
l
You should not test for longer than a few hours, as the time that you can
spend accessing the image is limited by the size of the image access log
and the size of the copy journal.
You can roughly estimate the time you can spend accessing an image in
logged access mode; if the image access log is 20% of the journal and
the journal provides a Protection Window of 48 hours, the image access
log should allow for 20% of 48 hours, or 4.8 hours of testing. However,
since there are many factors that can increase the writes to the image
access log (such as write-load, how far a snapshot is from the current
point-in-time, and so on), as a rule of thumb, you can use 10% of the
Protection Window as a very rough estimate.
Virtual
Access
When you disable image access any writes made to the copy volumes
while physical image access was enabled will be rolled back and
distribution will continue from the current image forward.
An image access mode that creates only the required parts of the image
you selected in a separate virtual volume, enabling virtual access to the
image almost instantly, as the system does not physically roll the copy
storage to the selected image.
Use this mode if you need quick access to a copy image.
Your testing time should be counted in minutes, and should not exceed
an hour, as the size of the image access log in virtual access mode is set
to 40 GB.
152
When you disable image access the virtual volume and all writes
made to it while image access was enabled are discarded.
Recovery
Setting
Description
l
Roll image in An image access setting that physically rolls the copy storage to the
background selected image in the background when virtual access is selected as the
image access mode. Once the roll is complete, the system starts
accessing the volume physically (in Logged Access mode).
Select this option if you selected virtual access as your image access
mode, but also want to (when the virtual roll is complete) run many
commands, test data from large areas of the copy, fail over or recover
production from the selected image, or have better performance while
testing (than virtual access).
l
When you disable image access, all writes performed while image
access was enabled are discarded.
More writes are made to the journal during virtual access than during
logged access. Therefore, in virtual access with roll, the Image access
log capacity progress bar will show a higher capacity in virtual access
mode, and then a lower capacity once the system switches to logged
access mode.
The virtual volume and the physical volume have the same SCSI ID,
therefore, the switch from one to the other will be transparent to
servers and applications.
153
Recovery
Dialog
Description
Activity
Diagram
Activity
Pane
The state of transfer between the selected copy and the production.
The write activity between the storage, host, journal, and RPAs at the
copy.
Use the Next steps (at the copy host) to guide you through the process of
testing your copy.
n
Transfer: The state of transfer between the production and the copy is
displayed in the middle of the link between them.
154
The Image access log capacity progress bar indicates how long you
can access the copy image before the image access log is full and all
writes to the copy fail. On XtremIO arrays, there is no time and space
limits on image access.
Recovery
Dialog
Description
Note
More writes are made to the journal during virtual access than during
logged access. Therefore, in virtual access with roll, the Image access log
capacity progress bar will show a higher capacity in virtual access mode,
and then a lower capacity once the system switches to logged access
mode.
After image access is enabled:
n
In the Test a Copy wizard, you can Undo Writes, Enable Direct
Access and Roll to Image.
Note
If you selected a group set in step 2 on page 149, use the following table to
navigate the screen.
Dialog
Description
Activity
Table
Depicts the recovery activity-related states of all relevant copies of all relevant
groups in the group set, at the specified RPA cluster.
n
The Group column contains the names of all of the relevant groups in the
group set. Each group can be listed multiple times, once for each copy at
the target cluster.
The Copy column contains the names of all relevant copies at the target
cluster.
The Copy Role column indicates each copys current role in replication
(local copy or remote copy).
The target copy of each group. If a group contains multiple copies at the
specified RPA cluster, the first copy in the group copy list is automatically
How to test a copy
155
Recovery
Dialog
Description
selected by the system. If the first copy isn't valid for the specified activity,
the second copy in the copy list is automatically selected.
Note
You can identify which copy was selected by the system in the Storage
column, as the copy will be in a state other than No Access or N/A.
n
The time stamp of the image being accessed at the target copy is
displayed in the Image column.
More writes are made to the journal during virtual access than during
logged access. Therefore, in virtual access with roll, the Image access log
capacity progress bar will show a higher capacity in virtual access mode,
and then a lower capacity once the system switches to logged access
mode.
Activity
Pane
Guides users through the process of testing their copy images of all relevant
copies in a group set.
After image access is enabled:
n
In the Test a Copy wizard, you can Undo Writes, Enable Direct Access
and Roll to Image.
In the Recover Production and Failover wizards, you can Undo Writes.
Note
b. Wait for image access to be enabled. If the image is being accessed in logged
access mode, wait for the system to roll to the selected image before you begin
testing.
c. At the copy host, prepare the copy volumes for testing.
Note
If you selected to access the image in virtual access mode, mount the volume
anyway. The virtual image has the same SCSI ID as the physical image.
d. Access the copy volumes, and test them as required.
e. In RecoverPoint, while testing:
156
Recovery
Note
This section does not apply to XtremIO. When accessing an image on XtremIO, log
capacity is irrelevant, and there is no time or space limit on image access.
Take note of the Image access log capacity progress. If the image access log gets
full, writes to the copy are blocked and you will have to select a corrective action:
Action
Description
Add journal Add journal volumes to the journal, enlarging the journals capacity. Note
that any additional journal volumes should be permanent, as removing a
volumes
journal volume causes all of the snapshots in the journal to be deleted and
requires a full sweep.
Note
Undo writes Undo Writes to use the information in the image access log to
automatically undo any writes made to the copy while image access was
enabled, without disabling image access.
Enable
direct
access
Note
Both the production and the copy volumes are unprotected during direct
access.
When image access is disabled, a short initialization will commence to
synchronize the copy with the production, and from that point on, your
volumes will be protected by RecoverPoint again.
Disable
image
access
Before disabling image access, stop the application and dismount the
copy host.
Click Cancel to disable image access and exit the wizard.
Description
Undo
Writes
Clears the image access log, removing any writes made to the copy while
image access was enabled, and allowing you to keep testing, without
disabling image access.
157
Recovery
Setting
Description
Use whenever one test case is complete, and before running a new test case
that is not dependent on the outcome of the previous test case, or when
resuming distribution.
Roll to
Image
Before using this option, at the copy host, shut down all applications
accessing the group volumes, unmount all group volumes, and deport
volume groups (if using logical disk management).
After using this option, at the copy host, mount the group volumes and
import volume groups to continue testing.
Note
Not relevant for XtremIO arrays. Only available through the Test a Copy
wizard.
Rolls the copy storage to the selected image in the background when Virtual
Access is selected as the image access mode. Once the roll is complete, the
virtual volume is discarded, and the physical volume takes its place.
Note
The virtual volume and the physical volume have the same SCSI ID, and
therefore, the switch from one to the other will be transparent to servers and
applications.
Use if you selected Virtual Access as your image access mode, but also need
to run many commands, test data from large areas of the copy, test for a
longer period of time, or maximum performance while testing.
Enable
Direct
Access
158
Once logged (physical) image access is enabled, hosts in the SAN will
have access to the storage volumes, and the RPA will not have access.
Distribution of images from the copy journal to the copy storage is paused.
More writes are made to the journal during virtual access than during
logged access. Therefore, in virtual access with roll, the Image Access Log
Capacity progress indicator will show a higher capacity in virtual access
mode, and then a lower capacity once the system switches to logged
access mode.
When you disable image access, the virtual volume and all writes made to
it are discarded, and any writes made to the copy volumes while logged
(physical) image access was enabled are rolled back. Distribution from the
copy journal to the copy storage continues from the current image forward.
Note
Only available through the Test a Copy wizard. Not relevant on XtremIO
arrays.
Recovery
Setting
Description
Enabling direct access to the copy image is not recommended, since it
disables RecoverPoint protection. In this mode, RecoverPoint stops imposing
a limit to the amount of data that you can write to storage because it stops
saving these writes in the image access log. That being said, direct image
access does provide better system performance when accessing the copy,
because rollback information is not being written to the image access log in
parallel with the ongoing disk I/Os.
Use if you have already physically rolled to the required image (in Logged
access mode or Virtual access with roll) and want to carry out processing that
generates a high volume of write transactions at the copy, and you don't mind
that both the production copy and the local/remote copy image will be
unprotected for as long as you are accessing the image.
Finish
After enabling direct access, you cannot roll back to an earlier image of the
accessed copy if you discover corrupted data. Moreover, in the event of a
disaster at the production during testing, you will be unable to remove any
new data that you have written to the copy unless the group contains
another non-production copy.
While direct access is enabled, the copy host has access to the storage
volumes, and the RPA does not have access, so distribution of images
from the copy journal to the copy storage is paused.
While direct access is enabled, replication stops and the transfer state for
the consistency group is Paused. The system continues to write markers to
the production journal volume, and uses these markers to efficiently
synchronize between the copy and production volumes when image
access is disabled.
Note
159
Recovery
Note
You can also access the Recover Production wizard when Monitoring and managing
groups on page 91 and Monitoring and managing copies on page 105, or you can Initiate
recovery activities for a group set on page 77.
By default, you cannot recover production from a copy image during initialization. For
production recovery to succeed, there must be a complete image in the copy journal
to recover production from; therefore, production recovery is not available during
initialization, while the snapshot being distributed is larger than the capacity of the
copy journal. To allow production recovery during initialization, set the value of the
allow_long_resync parameter of the config_copy_policy CLI command to
no (default is yes). When allow_long_resync is set to no, the system pauses
transfer whenever the snapshot being transferred is larger than the capacity of the
journal, at which point you can Add or edit journal volumes on page 136. Note that
any additional journal volumes should be permanent, as removing a journal volume
causes all of the snapshots in the journal to be deleted and requires a volume sweep.
Click Cancel to disable image access and exit the wizard. Click Cancel only when
you are done testing and don't plan to run any further tests on the copy in the near
future. After you click Cancel, RecoverPoint will disable image access and use the
information in the image access log to automatically undo any writes made to the
copy while image access was enabled.
NOTICE
160
Click Save & Close to exit the wizard without disabling image access and display
the Manage Recovery screen without starting the recovery activity. Use Save &
Recovery
Close if you have a test plan running and you want to exit the wizard now but keep
image access enabled and return to testing later.
l
The warning The requested operation will be performed on all of the groups in the
group set excluding the groups listed above.is displayed to the user for a group in
the group set when the requested activity is illegal for one or more groups in the
group set. A recovery activity is legal for a group at a target cluster only if the
group is enabled, and the action is legal for one or more copies of the group.
When this warning is displayed, note that the requested action will not be
performed for the listed groups.
If an action that is part of a recovery activity fails for one or more of the groups in a
group set, you may want to manually perform the action for each group on which
the action failed in order to bring all of the group set's groups to the same
recovery state.
Procedure
1. In RecoverPoint, select Recovery > Test a Copy and Recover Production.
2. In the Select a Copy screen:
a. Select either a consistency group or a group set by marking the appropriate radio
button and selecting an item from the list.
l
If you selected a consistency group, select a non-production copy from the list
of copies or the copy diagram.
161
Recovery
While selecting a copy, you can use the diagram to identify the state of data
transfer between the production and all copies in the group. The direction of
replication and type of replication are both illustrated.
Asynchronous replication is represented by a dashed line, while synchronous
replication is represented by a dashed line on top of a solid line.
Place your icon over any copy icon to display a tooltip with the copy Role, the
Storage state, and the state of Image access.
l
If you selected a group set, select a target RPA cluster from the list. When a
group set is selected, the table under the list of target RPA clusters can be used
to identify the direction of replication and number of copies in each group.
Recovery
The shadow copies will be bookmarked with the name that you assigned to
shadow copies in the Microsoft Volume Shadow Copy Service configuration.
b. Select your preferred Image access mode on page 152. In the Recover Production
wizard, while Virtual Access is enabled, Roll image in background is also enabled
and cannot be disabled.
c. Click Next > Start Recovery. RecoverPoint starts enabling image access to the copy
volumes.
NOTICE
Ensure image access is completely enabled, and then, mount the copy volumes at
the Data Domain copy host.
4. At the copy host, prepare the copy volumes for testing.
After image access is enabled, mount the copy volumes that you want to access. If the
volumes are in a volume group managed by a logical volume manager, import the
volume group.
5. Access the copy volumes, and test them as required.
Note
While testing the copy image, undo information for any changes made to the copy is
written to the image access log, and the changes are automatically undone when
image access is disabled.
Note
If the copy is on an XtremIO array, testing is performed upon a copy of the relevant
snapshot; the snapshot itself is unaffected. When testing is disabled, the copy of the
snapshot is deleted, without affecting the original snapshot.
6. In RecoverPoint, the Start Recovery screen differs based on whether you selected a
consistency group or a group set.
a. Use the screen to guide you through the process of testing your copy image/s:
l
If you selected a consistency group, use the activity diagram for groups on page
154 to navigate the screen.
163
Recovery
If you selected a group set, use the activity table for group sets on page 155 to
navigate the screen.
If any of the groups in the group set are not legal for the requested operation, a
warning will be displayed, and they will not be included in the Relevant copies
at target cluster table.
If any of the groups in the group set contain multiple relevant copies at the
target cluster, you can identify which copy was automatically selected by the
system in the Storage column. As illustrated in the screenshot above, group g4
contains two copies at the target cluster (r1, and r2) and the state of Storage at
copy r1 is Logged Access while the state of Storage at copy r2 is No Access,
meaning the system has automatically selected to recover the production of
group g4 using copy r1.
NOTICE
If you click Finish (start the recovery activity) before image access is enabled,
the action will only be performed on the groups for which image access has
already been enabled.
b. Wait for image access to be enabled and the system to roll to the selected image
before you begin testing the image. You know that image access is enabled by the
Image access progress indicator. On XtremIO arrays, access to the desired
snapshot is instantaneous.
c. Optionally, use the Test the Image options on page 157 to test the copy image.
d. While testing, take note of the Image access log capacity progress indicator. If the
image access log gets full, all writes to the copy are blocked and you will have to
select Corrective action on page 157. On XtremIO arrays, there are no time or
space limits for image access.
e. Ensure the Start replication to all copies in group(s) after recovery checkbox is:
164
Recovery
Migration should be planned well in advance, and the image to select for migration
should be part of an overall migration strategy.
165
Recovery
Note
You can also access the Failover wizard when Monitoring and managing groups on page
91 and Monitoring and managing copies on page 105, or you can Initiate recovery
activities for a group set on page 77.
If you are failing over temporarily in order to maintain the production system while
resuming production activities at a copy, go straight to step 1 on page 168. You can
only fail over temporarily if you have more than one non-production copy in the
group.
If you are failing over permanently, before you begin, gracefully shut down source-site
host activities on Windows Server platforms at the production: To ensure an up-todate image of the file system, flush all file systems that reside on the production
volumes.
NOTICE
Some applications, such as Exchange, have their own cache, which should be
flushed as well. Flushing the file system does not flush application-level data.
Close all applications that are using the consistency groups volumes at the
production site (refer to the RecoverPoint Technical Notes for the relevant
application). Place each drive volume used by the consistency group into an offline
state:
166
Using Windows GUI: by opening the Windows Disk Management console, rightclicking the RecoverPoint protected volume, and selecting the OFFLINE option.
If your production or copy hosts are running on AIX operating systems or are part of a
Windows cluster server, you should perform a first-time failover on each consistency
group as soon as it is configured. See the EMC RecoverPoint Deploying Windows File
Server Technical Notes or the EMC RecoverPoint Deploying with AIX Hosts Technical Notes
for the first-time failover procedure of your specific host type.
If a consistency group contains both a local copy and a remote copy, and you start to
fail over to the remote copy while the local site does not have enough licensed
remote replication capacity for two times the capacity of the consistency group, you
will receive the error message Remote replication limit exceeded. and will have to
mitigate the situation for the failover to succeed. If this happens, consider removing
the local copy, or Install a license on page 217 for more remote replication capacity.
By default, you cannot fail over to a copy image during initialization. For failover to
succeed, there must be a complete image in the copy journal to fail over to; therefore,
failover is not available during initialization, while the snapshot being distributed is
larger than the capacity of the copy journal. To allow failover during initialization, set
the value of the allow_long_resync parameter of the config_copy_policy
CLI command to no (default is yes). When allow_long_resync is set to no, the
system pauses transfer whenever the snapshot being transferred is larger than the
capacity of the journal, at which point you can Add or edit journal volumes on page
136 (not relevant in XtremIO). Note that any additional journal volumes should be
Recovery
permanent, as removing a journal volume causes all of the snapshots in the journal
to be deleted and requires a volume sweep.
l
In XtremIO, after failover, if either the production or the copy is on an XtremIO array,
the snap-based replication mode after failover may require user intervention before
failover can proceed. Refer to the following table for guidance.
Table 34 XtremIO snap-based replication mitigation after failover
Production
array
Copy array
Replication
mode
before failover
Replication mode
after failover
XtremIO
XtremIO
Continuous or
Periodic
Same as before
failover.
XtremIO
VNX
Continuous
Periodic
Remains Periodic
Mitigation plan
XtremIO
VPLEX,
Symmetrix,
VNXe, VNX
No snap-based
replication
configured
Asynchronous is
Enabled, RTO is25
seconds.
VNX
XtremIO
On Highload
VNX
XtremIO
Periodic
Remains Periodic.
VNX
XtremIO
No snap-based
replication
configured
VPLEX,
Symmetrix,
VNXe
XtremIO
167
Recovery
The warning The requested operation will be performed on all of the groups in the
group set excluding the groups listed above.is displayed to the user for a group in
the group set when:
The requested activity is illegal for one or more consistency groups in the
group set. A recovery activity is legal for a group at a target cluster only if the
group is enabled, and the action is legal for one or more copies of the group.
When this warning is displayed, note that the requested action will not be
performed for the listed groups.
All of the links between the new production and all target copies in the group
have not been manually defined before failover. After failover, the option to set
a copy on the target RPA cluster as the new production will only be available
for groups if all links from the new production to all target copies have already
been defined.
While parallel bookmarking is enabled for a group set, changing the direction of
replication will temporarily disable the creation of parallel bookmarks for all
groups that are part of the group set. Parallel bookmarks will not be created while
groups in the group set are replicating in different directions.
If an action that is part of a recovery activity fails for one or more of the groups in a
group set, you may want to manually perform the action for each group on which
the action failed in order to bring all of the group set's groups to the same
recovery state.
Procedure
1. Select Recovery > Test a Copy and Fail Over.
2. In the Select a Copy screen:
a. Select either a consistency group or a group set, marking the appropriate radio
button and selecting an item from the list.
l
If you selected a consistency group, select a non-production copy from the list
of copies or the copy diagram.
While selecting a copy, you can use the diagram to identify the state of data
transfer between the production and all copies in the group. The direction of
replication and type of replication are both illustrated. Asynchronous
replication is represented by a dashed line, while synchronous replication is
represented by a dashed line on top of a solid line. Place your icon over any
168
Recovery
copy icon to display a tooltip with the copy Role, the Storage state, and the
state of Image access.
l
If you selected a group set, select a target RPA cluster from the list. When a
group set is selected, the table under the list of target RPA clusters can be used
to identify the direction of replication and number of copies in each group.
169
Recovery
b. Select your preferred image access mode on page 152. In the Failover wizard,
while Virtual Access is enabled, Roll image in background is also enabled and
cannot be disabled.
c. Click Next Start > Failover.
RecoverPoint starts enabling image access to the relevant copy volumes.
4. In RecoverPoint, the Start Failover screen differs based on whether you selected a
consistency group or a group set.
a. Use the screen to guide you through the process of testing your copy image(s):
l
If you selected a consistency group in step 2 on page 168, use the activity
diagram for groups on page 154 to navigate the screen.
If you selected a group set in step 2 on page 161, use the activity pane for
group sets on page 155 to navigate the screen.
If any of the groups or copies in the group set are not legal for the requested
operation, they will not be displayed in the Relevant copies at target cluster
table.
170
Recovery
If any of the groups in the group set contain multiple relevant copies at the
target cluster, you can identify which copy was automatically selected by the
system in the Storage column. As illustrated in the screenshot above, group g4
contains two copies at the target cluster (r1, and r2) and the state of Storage at
copy r1 is Logged Access while the state of Storage at copy r2 is No Access,
meaning the system has automatically selected to fail over group g4 to copy r1.
b. Wait for image access to be enabled and the system to roll to the selected image
to begin testing. You know that image access is enabled by the Image access
progress indicator. On XtremIO arrays, image access is nearly instantaneous.
If you click Finish (to start the recovery activity) before image access is enabled,
the action will only be performed on the groups for which image access has
already been enabled.
c. If you are permanently failing over; resume production disk activities by placing
each production drive volume used by the consistency group into an online state:
Note
If you are only failing over temporarily, and planning to fail back as soon as the
production is restored, skip this step.
l
Using Windows GUI: by opening the Windows Disk Management console, rightclicking the RecoverPoint protected volume, and selecting the ONLINE option.
d. At the copy host, prepare the volumes for testing: After image access is enabled,
mount the copy volumes that you want to access and import the volume groups (if
any).
e. Access the copy volumes, and test them as required. While testing the copy image,
undo information for any changes made to the copy is written to the image access
log, and the changes are automatically undone when image access is disabled.
f. In RecoverPoint, use the Test the Image options on page 157 to test the copy
image.
g. Ensure the Start replication to all copies in group(s) after recovery checkbox is:
l
h. While testing; take note of the Image access log capacity progress indicator. If the
image access log gets full, all writes to the copy are blocked and you will have to
select a corrective action on page 157.
5. When testing is complete:
Note
If the group only contains one non-production copy, unmount the copy volumes and
deport any volume groups now.
171
Recovery
Click Finish to disable image access, start failing over to the selected image, and
display the Manage Recovery on page 173 screen.
Note
If your consistency group contains both a local copy and a remote copy, and you
selected to fail over to the remote copy while the local site does not have enough
licensed remote replication capacity for two times the capacity of the consistency
group, you will receive the message Remote replication limit exceeded. and will have
to mitigate the situation for the failover to succeed. Consider removing the local copy
or Install a license on page 217 for more remote replication capacity.
6. In the Manage Recovery on page 173, click the Show Activity Diagram link and note
that the direction of replication changes as the selected copy image is applied to the
production. The Image status of the new production becomes Distributing Prereplication image and the new copy Role becomes Failing Over. During image access,
the Back to Wizard on page 179 link can be used to return to the wizard until the
selected image is completely applied to the production.
After failover:
l
If there is more than one non-production copy in the group, you can repair the
production now. Your applications and business operations continue at the copy.
The production journal and the production storage (assuming they are online) are
kept up to date from the copy. The Role of the production becomes Target at
Productionand the Role of the selected copy becomes Local Source if a local copy
was selected, or Remote Source if a remote copy was selected.
172
set your copy (or copies) as the new production on page 176
Recovery
Manage Recovery
Use Manage Recovery to monitor and manage all of the recovery activities currently
occurring in the system. All of the accessed copies in the system are displayed in the
Manage Recovery screen.
In the Manage Recovery screen, the options that you have and the information that is
displayed in the recovery bars depends on the specific recovery activity, and whether you
have selected to perform the activity on a consistency group or a group set.
Figure 17 Recovery bar for consistency groups
Recovery Activity
Relevant Copy
173
Recovery
n
l
Click the Show Activity Diagram link to monitor the activity progress.
In the recovery bar for group sets on page 173, click the Show Copy Activity link to
expand the group set and display a recovery bar for consistency groups on page 173 for
each relevant copy in the group set.
NOTICE
If an action that is part of a recovery activity fails for one or more of the groups in a group
set, you will have to manually perform the action for each group on which the action
failed in order to bring all of the group set's groups to the same recovery state.
l
Click the Show Activity Diagram link of a group to monitor the activity progress.
Testing a copy
When the Activity type is Testing a copy, the following options are available in the Select
Next Action combo box:
174
Continue Testing
Finish Testing
Recovery
Continue Testing
To open the Test a Copy wizard to the Test the Image screen and continue testing using
the Activity Diagram for Groups on page 154 or the Activity Table for Group Sets on page
155, and the Test the Image options on page 157.
Finish Testing
To stop testing and Disable image access to the relevant group or group set copies.
Failing over
When the Activity type is Failing Over, the following options are available in the Select
Next Action combo box:
NOTICE
If you are failing over a group set, you can select Back to Wizard on page 176, Set Copy/
Copies as Production on page 176, or Fail Back to Production on page 178 in the
Recovery bar for group sets to apply the action to all relevant copies at the target RPA
cluster.
Failing over
175
Recovery
Back to Wizard
Opens the Fail Over wizard to the Start Failover screen.
Note
This option is displayed until you manually click Back to Wizard and in the Failover
wizard, click Finish.
This option is only relevant for groups (or group sets containing groups) with more than
one non-production copy.
Use the following procedure to permanently fail over to the accessed copy/copies.
Procedure
1. At the copy host, close any applications accessing the copy, unmount the copy
volumes and deport volume groups (if any) now.
2. In RecoverPoint, select Set Copy/Copies as Production:
l
If the accessed copy is the only non-production copy in the group, in the Activity >
Diagram, the Role of the Target at Productionbecomes Production. The Role of the
Local Sourcebecomes Local Copy.
There is a short initialization between the new production and the former
production. All local and remote copies that are not the new production or former
production undergo a full sweep.
If you are failing over a group and the accessed copy is not the only nonproduction copy in the group, the Set Production dialog box is displayed,
prompting you to decide what you want to do with any target copies of the new
production, as a consequence of failover.
If you are failing over a group set containing groups with more than one nonproduction copy, the Set Production dialog box is not displayed and before setting
a target copy as the new production, you will need to Modify a links protection
policy on page 115 for all of the links between the new production and all of the
new target copies.
176
Recovery
Setting
Description
Configure a new link To define a new link between the two copies, and set the
between <CopyName> link policy. When selected, one of the replication modes
and <CopyName>
must be defined.
Note
Remove Copy
<CopyName>
Failing over
177
Recovery
Recovering production
When the Activity type is Recovering Production, only Back to Wizard is available.
NOTICE
If you are recovering production for a group set, you can select Back to Wizard in the
recovery bar for group sets to apply the action to all relevant copies at the target RPA
cluster.
178
Recovery
Back to Wizard
Opens the Recover Production wizard to the Start Recovery screen so you can continue
testing using the Activity Diagram for Groups on page 154 or the Activity Pane for Group
Sets on page 155, and the Test the Image options on page 157.
Recovering production
179
Recovery
180
CHAPTER 5
RPA Clusters
This section describes the RPA Clusters menu and how to use it to manage and monitor
replication in RecoverPoint.
l
l
l
l
l
l
l
RPA Clusters
181
RPA Clusters
RecoverPoint clusters
Monitoring or administration of components in a RecoverPoint system that are managed
by RPA clusters is performed through the RPA Clusters interface. The information for each
RPA cluster is displayed in a separate tab of the interface.
Option
When to use
General
Cluster Info
To display the specified RPA cluster graphically as part of a site map and view
general cluster information, or to display any alerts that may have been logged
for any of the physical components of your RecoverPoint system, at the selected
RPA cluster.
Storage
To register arrays, vCenter Servers, and resource pools and manage their
registration in the RecoverPoint system.
Splitters
Note
RPAs
vCenter
Servers
To display the RPA table containing all RPAs in the selected RPA cluster, and the
status and properties of each.
Note
Pheonix
Systems
Note
182
RPA Clusters
The General Cluster Info section contains a Cluster Diagram and a Cluster Details section
that allow you to easily monitor and analyze the current state of the RPA cluster. The
cluster diagram contains all of the major components of the RecoverPoint system (host,
storage, and RPAs) and the connectivity between them and the RPA cluster. An icon is
displayed on any system component for which system Alerts on page 42 have been
registered.
The following information is displayed in the details section below the cluster diagram:
183
RPA Clusters
Information
Description
RecoverPoint
Version
The version of the RecoverPoint software that is currently installed on the RPA
cluster.
If the system is in maintenance mode, the RecoverPoint version will display N/A
System is in maintenance mode.
Internal RPA
Cluster Name
The internal system name given to RPA clusters, and used in upgrade scenarios.
Management
IPv4
The IP address assigned to the LAN interface of the RPA cluster in order to define
the management interface network, in IPv4 format.
Note
Use this IP to connect to the RPA in the RPA cluster that is running the cluster
control, in IPv4 format.
Management
IPv6
The IP address assigned to the LAN interface of the RPA cluster in order to define
the management interface network, in IPv6 format.
Note
Use this IP to connect to the RPA in the RPA cluster that is running the cluster
control, in IPv6 format.
Software
Serial ID
Number of
RPAs
RPA Type
The type of the RPA cluster. Valid values are Physical or Virtual.
Maintenance
Mode
184
RPA Clusters
Information
Time Zone
Description
l
Minor Upgrade
Major Upgrade
Hardware Replacement
Repository Change
RP/SE Conversion
System Modification
Unknown
Storage
Use the RPA Clusters > RPA-Cluster-Name tab > Storage link to enable RecoverPoint
storage awareness by registering new arrays, vCenter Servers and resource pools or
manage existing registered arrays, vCenter Servers, and resource pools.
Note
185
RPA Clusters
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the storage currently registered at the selected RPA
cluster and the following storage-specific information is displayed for each:
Table 37 Storage information
Information
Description
Name
186
CLARiiON
ScaleIO
RPA Clusters
Information
Description
l
VNX
VPLEX
vCenter Server
XtremIO
Data Domain
IP
The IP address of the array or vCenter Server management interface. In the case
of ScaleIO storage, it may be a list of IP addresses.
Version
Splitter
Whether or not there is connectivity between the array or vCenter Server and the
RPA cluster.
Register storage
Before you begin
Note
This procedure is not relevant to VNXe, which registers itself with RecoverPoint
automatically.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Storage.
Note
You can also register vCenter Servers by selecting RPA Clusters > <RPA-Cluster-Name>
tab > vCenter Servers .
Register storage
187
RPA Clusters
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the Data Domains, arrays and vCenter Servers that are
currently registered at the selected RPA cluster and their storage information on page
186.
3. In the right pane, in the Registered Storage tab, click Add. The Register Storage
dialog box is displayed.
4. In the Register Storage dialog box, you can:
l
Register an array that has already been masked to the RPA cluster
188
RPA Clusters
For VNX/CLARiiON storage, all of the fields are mandatory. Enter the IP addresses of
SP-A and SP-B, the username and password of your storage and an authentication
scope.
For VPLEX storage, the storage IP address, username and password are mandatory.
Alternatively, retrieve a certificate from system or manually select it.
189
RPA Clusters
For ScaleIO storage, the ScaleIO MDM credentials and IP1 address are mandatory.
For Data Domain, enter the Data Domain IP or hostname, the SU-vDisk user and
password, and enter the SU name.
Note
Requires additional configuration on the Data Domain (addition of the RPAs as hosts
and FC connectivity). By default, the Select FC for data transfer checkbox is enabled.
If your Data Domain doesn't have Fibre Channel connectivity and you want to connect
it using IP, uncheck this checkbox.
190
RPA Clusters
For XtremIO storage, the IP address is of the XtremIO Management Server (XMS).
Select the PSNT (Product Serial Number) of the desired XtremIO cluster (not required
if the array is already exposed to RecoverPoint and listed here).
If the XtremIO Management Server manages more than one cluster, register each
cluster separately, always using the IP address of the XtremIO Management Server.
Then enter the XtremIO rp_user as the User; and the rp_user password as the
Password. The Password can be changed in the XtremIO user interface. If the XtremIO
Management Server IP or rp_user changes, use this screen to change the registration
in RecoverPoint.
l
For vCenter Server storage, all of the fields are mandatory and the default TCP port is
443. Best practice is to configure the vCenter Server to require the use of a certificate
because once RecoverPoint has read the certificate, it does not need further access to
the location. The default certificate locations are:
Define storage login credentials
191
RPA Clusters
Unregister storage
Use the following procedure to unregister storage from an RPA cluster.
Note
You can also unregister vCenter Servers by selecting RPA Clusters > RPA-Cluster-Name >
vCenters Server.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Storage.
In the right pane, the Registered Storage tab is displayed. The Registered Storage tab
contains the list of all of the storage currently registered at the selected RPA cluster,
and its storage information on page 186.
3. In the right pane:
192
RPA Clusters
You can also edit the registration details of a vCenter Servers from the vCenter
Servers on page 211 link.
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the arrays and vCenter Servers that are currently
registered at the selected RPA cluster and their storage information on page 186.
193
RPA Clusters
194
Information
Description
Name
Type
RPA Clusters
Information
Description
l
RAID groups
Storage pools
Data stores
vDisk pools
Total Size
Available
Size
The total capacity of the resource pool minus the capacity of the volumes that
were already allocated in the resource pool.
Tiers
The physical type of the storage. For example, Fibre Channel, SATA, etc.
Available
Tiering
Policies
The tiering policies that are available on storage and can be automatically
applied to volumes in RecoverPoint when users automatically provision volumes.
Pre-configure resource pools on the Data Domain in the same user storage unit and
vDisk pool.
After registering a vDisk pool, only a manual change on the Data Domain will be able
to unregister them and make them available for other clusters or uses.
Procedure
1. Select RPA Clusters.
2. Select the tab of the relevant RPA cluster.
3. In the left pane, select Storage.
In the right pane, the Registered Storage tab is displayed. The Registered Storage tab
contains the list of all of the Data Domains, arrays and vCenter Servers that are
currently registered at the selected RPA cluster and their storage information on page
186.
195
RPA Clusters
RPA Clusters
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the arrays and vCenter Servers that are currently
registered at the selected RPA cluster and their storage information on page 186.
3. In the Registered Storage tab, select the array or vCenter Server whose resource pools
you want to unregister.
The Registered Resource Pools table is displayed in the Registered Storage tab. The
Registered Resource Pools table contains the list of all of the resource pools of the
selected array or vCenter Server, that are currently registered at the selected RPA
cluster and their storage information on page 194.
4. In the Registered Resource Pools table:
a. Select the resource pool you want to unregister.
b. Click Remove, and click Yes in the confirmation dialog box.
Splitters
Note
Splitters
197
RPA Clusters
In RecoverPoint, all installed splitters are automatically added to the system, and all
volumes that are masked and zoned to the RPA are automatically attached to all existing
splitters at a site. In the rare case that a splitter is added to the system after the system is
already installed, you will need to add the splitter to the system, and attach the relevant
volumes to the splitter. Multiple splitters can be attached to one RPA cluster. See the EMC
RecoverPoint Release Notes for the limitation on the maximum number of splitters that can
be attached to a cluster.
If there are splitters that have been installed on the storage but have not been added to
the system or volumes that have not yet been attached to any splitters, an alert is
displayed in the:
l
Alerts on page 42
If an alert is displayed, select the Splitters link in the left pane to:
l
Add splitters
198
RPA Clusters
Results
The Splitters table is displayed in the right pane, with the following splitter-specific
information:
Table 39 Splitter information
Information
Description
Status
Name
Type
RPA Link
Whether or not there is connectivity between the RPA and the splitter.
Attached RPA
Clusters
When a VPLEX splitter is selected in the Splitters table, the Directors are displayed above
the Volumes Attached to Selected Splitter section.
199
RPA Clusters
Information
Description
Group
Copy
Replication
Set
The name of the replication set that the volume belongs to.
Access
The data access state of the volume, with regards to the splitter. Once a volume
is configured in RecoverPoint, including attachment to a splitter, the RPA can
place the volume in any of the displayed states.
Also
Replicated by
SRDF
Add splitters
Use the following procedure to connect your RecoverPoint write-splitters to RecoverPoint.
Before you begin
200
If splitters have been installed on your arrays before installing RecoverPoint, they will
automatically be added to the RecoverPoint system, see splitter installation in the
EMC RecoverPoint Installation and Deployment Guide and the RecoverPoint technical
notes for your specific splitter type. However, if a storage array was added to the
system after deployment, the splitter will need to be added to the system.
All splitters that are masked and zoned to the RPAs are automatically added to the
system, unless they are already attached to another RPA cluster. VPLEX, VNX and
Symmetrix splitters are automatically added to the system regardless of masking and
zoning, unless they are already attached to the maximum allowed number of RPA
clusters. See the EMC RecoverPoint Release Notes for the maximum number of RPA
clusters that can be attached to a splitter.
Splitters residing on arrays that are not licensed are not automatically added to the
system.
RPA Clusters
Splitters removed by the user will not be re-added automatically by the system.
ScaleIO splitters are added to the system after the automatic SAN rescan cycle is
complete. If the ScaleIO splitter is not visible in the system, manually run the
rescan_san CLI command.
For VNX splitters: Although the two storage processors are listed as separate entities
(Splitter 1-A and Splitter 1-B), they are managed as a single entity. If you add or
remove a splitter, the second storage processor instance is automatically added or
removed.
If a production storage volume is rolled back by a VNX SnapView session, the VNX
splitter will automatically initialize a full sweep of any of the volumes attached to
the splitter.
A single VNX splitter can be shared by up to four 4 RPA clusters. While attaching a
VNX splitter to a fifth RPA cluster appears to succeed, the splitter is in an error
state for the newly attached RPA cluster. All splitter operations for this RPA cluster
fail and return the error: Maximum RPA clusters per splitter exceeded. In this case,
remove the VNX splitter from the fifth RPA cluster.
The VNXe splitter has a designated Snapshot Mount Point for every LUN. No full
sweep occurs when adding or rolling back array snaps.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Splitters.
3. In the right pane, click Add.
Note
The Add button is only enabled when there are splitters installed on the storage and
ready to add to the system.
4. In the Add Splitter dialog box; select the splitter that you want to add, and click OK.
If the selected splitter is a VNX/VNXe/CLARiiON splitter, both SP-A and SP-B are added
when one of them is selected.
Add splitters
201
RPA Clusters
Remove splitters
Note
You must Detach volumes from the splitter on page 203 before you can remove it from
the system. Only splitters that are not attached to any volumes can be removed.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Splitters.
3. In the right pane; select one or more splitters in the Splitters table, click Remove, and
click Yes in the confirmation dialog box. If the selected splitter is a VNX/CLARiiON
splitter, both SP-A and SP-B are removed when one of them is selected.
RecoverPoint automatically detects all paths from the splitter to the volume. If no
path exists between the splitter and the volume, you cannot attach the volume to that
splitter.
You cannot replicate a volume until it is attached to a splitter. You cannot fail over to
a local or a remote copy of a volume until it is attached to a splitter.
Although the two storage processors are listed as separate entities (Splitter 1-A
and Splitter 1-B), they are managed as a single entity. If you attach or detach a
volume at one instance, the same volume will automatically be attached or
detached at the other storage processor instance.
If you attach a volume to an RPA cluster, and that volume is already attached to a
different RPA cluster that shares the same VNX splitter, the volume appears to
attach successfully to the second RPA cluster, but then faults to the Attached to
other RPA cluster/s error state. The volume cannot be used by the RPA cluster to
which it was just attached. To correct this error, click Detach to detach the volume
from the RPA cluster.
Note
202
RPA Clusters
NOTICE
203
RPA Clusters
RPAs
Select RPA Clusters > RPA-Cluster-Name > RPAs to display all of the RPAs in the
RecoverPoint system and the status and properties of each RPA.
The RPA table displays the following information for each RPA:
Table 41 RPA Clusters: RPA table
Column
Description
Status
Indicates if the RecoverPoint appliance, LAN interface card, and WAN interface
card are alive.
ID
The ID of the RPA. Each RPA in an RPA cluster has an RPA ID that starts with the
string RPA and ends with a number from 1-8. Only RPA1 and RPA2 can run the
cluster control.
WAN IP
Management
IPv4
The LAN IP address of the RPA, in IPv4 format. Use this address to open a direct
session with an RPA.
Connectivity
Indicates if communication to all RPAs in the RPA cluster is alive and if the
storage link, repository volume, data link, and communication with the remote
RPA are all alive; if one RPA is down, connectivity of every RPA in the cluster will
report an error.
When an RPA in the RPA table is selected, the tabs at the bottom of the screen display the
RPA:
204
RPA Clusters
Properties
The Properties tab displays the main properties of each RPA.
Figure 23 RPA Clusters > RPA-Cluster-Name tab > RPAs > Properties
Select an RPA in the RPA table and click the Properties tab to display:
Table 42 RPA Clusters: RPA properties tab
Field
Description
RPA Cluster
ID
The ID of the RPA. Each RPA in an RPA cluster has an RPA ID that starts with the
string RPA and ends with a number from 1-8. Only RPA1 and RPA2 can run the
cluster control.
WAN IP
Management
IPv4
The LAN IP address of the RPA, in IPv4 format. Use this address to open a direct
session with an RPA.
Management
IPv6
The LAN IP address of the RPA, in IPv6 format. Use this address to open a direct
session with an RPA.
RecoverPoint
Version
Hardware
Platform
Hardware
Serial ID
Memory
CPUs
Properties
205
RPA Clusters
Status
The Status tab displays the connectivity statuses of each RPA.
Figure 24 RPA Clusters > RPA-Cluster-Name tab > RPAs > Status
Select an RPA in the RPA table and click the Status tab to display:
Table 43 RPA Clusters: RPA status tab
Field
Description
RPA Status
Repository
Volume
Storage Link
WAN Interface
Whether or not the physical WAN port is alive, the interface card is functional,
and communication with other local RPAs exists.
FC Connectivity
Communication
with Remote RPA
Cluster
Whether or not the RPA has access to the remote RPA that it is paired with for
replication.
Data Link
Whether or not data can be replicated to the remote RPA that the selected
RPA is paired with for replication.
LAN IPv4 Interface Whether or not the physical LAN port is alive, the interface card is functional,
and communication with other local RPA (if any) exists.
206
RPA Clusters
Interface
The Interface tab displays the Fabric Interface settings of each RPA.
Figure 25 RPA Clusters > RPA-Cluster-Name tab > RPAs > Interface
Select an RPA in the RPA table and click the Interface tab to display the Fabric Interface
settings for each RPA HBA port. These settings are required when replacing a faulty RPA.
Traffic Statistics
Select an RPA in the RPA table and click the Traffic Statistics tab to display the RPAs
traffic statistics.
Figure 26 RPA Clusters > RPA-Cluster-Name tab > RPAs > Traffic Statistics
The Traffic Statistics tab displays the following statistics for the selected RPA:
Interface
207
RPA Clusters
Figure 26 RPA Clusters > RPA-Cluster-Name tab > RPAs > Traffic Statistics (continued)
l
Total traffic
The Total Traffic widget displays the total amount of data that is transferred by the
selected RPA in the SAN and between clusters, in Mb/s.
Application traffic
The Application Traffic widget displays the total amount of application data that is
transferred by the selected RPA in the SAN and between clusters, in Mb/s.
208
RPA Clusters
Initialization traffic
The Initialization Traffic widget displays the total amount of data that is transferred by
the selected RPA in the SAN and between clusters during RecoverPoint initialization, in
Mb/s.
Usage Statistics
Select an RPA in the RPA table and click the Usage Statistics tab to display the RPAs
resource usage statistics.
Figure 27 RPA Clusters > RPA-Cluster-Name tab > RPAs > Usage Statistics
The Usage Statistics tab displays the following statistics for the selected RPA:
l
Usage Statistics
209
RPA Clusters
Incoming writes
The Incoming Writes widget displays the amount of incoming writes that are transferred
by the selected RPA, per second.
Bandwidth reduction
The Bandwidth Reduction widget displays the ratio by which the bandwidth usage of the
selected RPA is reduced per minute due to RecoverPoint.
CPU usage
The CPU Usage widget displays the percent of the selected RPAs CPU that is utilized per
minute.
210
RPA Clusters
vCenter Servers
Select RPA Clusters > RPA-Cluster-Name > vCenter Servers to display the vCenter Server
table, monitor, register, or remove vCenter Servers. The vCenter user should have the
necessary privileges to perform the desired tasks.
Figure 28 RPA Clusters: vCenter Servers
When the vCenter Server's IP address is selected, the bottom pane displays the vCenter
Servers object, and under it, all VMware vCenter Servers registered with RecoverPoint.
The view displays data extracted from the VMware vCenter Server together with
RecoverPoint replication data.
In addition to displaying ESX servers and all their virtual machines, datastores, and RDM
drives, the RecoverPoint vCenter Server view also displays the replication status of each
volume. The RecoverPoint vCenter Servers view is for monitoring only (read-only).
Select the vCenter Servers link to:
l
211
RPA Clusters
For more information about the location of the security certificate, refer to Replacing
vCenter Server Certificates VMware vSphere 4.0, available at www.vmware.com.
Information
Replication
status
Icon
Description
Fully configured for replication
Partially configured for replication
Not configured for replication
IP address
l
Every LUN and raw device mapping accessed by each virtual machine, with the
following details:
n
Replication status: fully configured for replication or not configured for replication.
n
For LUNs or devices configured for replication by RecoverPoint, the following are
displayed: consistency group, copy (Production, Local, Remote), replication set,
and which datastore for each LUN or raw device mapping is configured for
replication.
212
RPA Clusters
Setting
Description
vCenter Server IP address of the vCenter Server. This is also the display name of the vCenter
IP
Server in the top pane.
Port
Username
Password
Certificate
If you wish to specify a certificate, browse to and select the certificate file.
Setting
Description
vCenter Server IP address of the vCenter Server. This is also the display name of the vCenter
IP
Server in the top pane.
Port
Username
Password
Certificate
If you wish to specify a certificate, browse to and select the certificate file.
213
RPA Clusters
3. In the right pane; select a vCenter Server, click Remove, and click Yes in the
confirmation dialog box.
Phoenix Systems
Select RPA Clusters > RPA-Cluster-Name > Phoenix Systems to use, monitor or disable
Phoenix System RP Protection. The top-right pane allows you to choose which Phoenix
system to use. It also displays the status, disk capacity, and available disk capacity. For
more details, see EMC RecoverPoint Deploying with Phoenix System RP Technical Notes.
214
CHAPTER 6
Admin
This section describes how to license and register RecoverPoint, how to manage users,
roles, and user authentication, how to configure system notifications, detect bottlenecks
in replication, analyze the load on each RPA, and collect system information for support
purposes. This section also describes how to export statistics and use the statistics tool
through the RecoverPoint CLI.
l
l
l
l
l
l
Admin
215
Admin
RecoverPoint Administration
Administration of RecoverPoint users and the RecoverPoint system is performed through
the Admin menu.
Option
When to Use
Manage
Licenses
To add or remove your RecoverPoint license files from the system or view your
RecoverPoint license details.
Users and
Roles
To manage users, roles, and user authentication. To log off and log back in as a
different user, to change the password of the currently logged in user , or to
change after how much idle time to log off the user.
System
Analysis
Tools
To detect bottlenecks in replication, analyze the load on each RPA, and collect
system information for support purposes.
To configure system reports and alerts, manage event filters and call home
System
Notifications events.
Manage Licenses
Select Manage Licenses to add or remove RecoverPoint licenses from the system, when
Licensing RecoverPoint on page 17.
216
Admin
Install a license
Before you begin
When the first license file is added to the system, the Software Serial ID (SSID) in the new
license is automatically used as the identifier of your RecoverPoint system.
NOTICE
When subsequent licenses are added to the system, if they contain a different SSID than
the one currently in the system, you will need to register your RecoverPoint system again
with the new SSID.
Procedure
1. Select Admin > Manage Licenses to display the Manage Licenses screen.
Install a license
217
Admin
Note
To ensure that your license file contains the anticipated configuration, Display your
RecoverPoint license information on page 219 and check this information against the
license file variables on page 295.
Remove licenses
Procedure
1. Select Admin > Manage Licenses.
2. Select the license that you want to remove, and click Remove.
Note
A warning is issued if removing the license may cause the system to exceed the
allowed replication capacity (for example, when an array license is removed but an
existing consistency group contains volumes that reside on the removed array).
218
Admin
Parameter Values
Type
Description
RecoverPoint/CL: None
Display your RecoverPoint license information
219
Admin
Parameter Values
Description
l
Replication Local
Remote
Capacity
<Capacity>
Expiration
<Date>
Permanent
Active
Expired
Inactive
Status
Note
Check the displayed information against the license file variables on page 295 for
correctness and Monitor your license limits on page 218 to ensure that you are
replicating well within the limits of your RecoverPoint license.
Register RecoverPoint
Select the Register RecoverPoint menu to fill out or update your RecoverPoint postdeployment form and automatically send it to the EMC Install Base Group, registering
your RecoverPoint product.
220
Admin
The RecoverPoint registration process will fail if you do not first configure your SMTP
address on page 266.
The registration process will be incomplete if valid values are not provided for every
field in the post-deployment form.
When a new RPA cluster is added to the system, it is automatically added to the postdeployment form with empty parameter values. Ensure you have entered the values
for all new RPA clusters before sending the post-deployment form to the IB group.
Procedure
1. Select Admin > Register RecoverPoint to display the RecoverPoint Post-Deployment
Form.
221
Admin
2. Click Update Form to display the Update Post-Deployment Form Details dialog box.
222
Field
Description
For Example
Activity Type
Upgrade
Location
Upgrade/
Installation
Performing
Resource
Customer
Sales Order
Number
62276566
VCE
Connect
Home
Software: ESRS
(preferred), E-mail,
Not Allowed
Hardware: Not
Applicable
Connect In
Software: ESRS
(preferred), WebEx, or
Not Allowed
Admin
Field
Description
For Example
c. Click Apply to save each change to the form, without closing the dialog box.
d. Click OK to save all changes and close the dialog box.
NOTICE
If your company does not have SyR connectivity, and therefore, you cannot
Configure system reports and alerts on page 266, you can skip the rest of the
steps in this procedure, Export the post-deployment form to a CSV file on page
224 and Register RecoverPoint by email or phone on page 225 now.
4. Click Send Form to automatically send the post-deployment form to the EMC Install
Base group. The Send Form dialog box is displayed.
5. In the Send Form dialog box, enter the email address of the person at your company
that is in charge of RecoverPoint maintenance and operation.
Note
Call home event 8000 is sent to EMC with your updated registration information and
an email is sent to the specified email address from EMC Customer Support to verify
that your registration details were updated successfully in the EMC Install Base.
6. Wait a couple of minutes.
7. Select Dashboard > System Events and look for events 8000 Calling homeCalling
home. If event 8000 is logged; the registration details were successfully sent to the
EMC Install Base.
Register your RecoverPoint system
223
Admin
Results
The following information is automatically sent along with the information that you
entered into the post-deployment form, per RPA cluster:
l
Software serial ID
Cluster name
License type
224
Admin
e. Click Finish.
The registration process will be incomplete if valid values are not provided for every
field in the post-deployment form.
Procedure
1. Access https://support.emc.com
2. Search for the term Post-Deployment Form
3. Download and fill out the RecoverPoint and RP for VMs Post-Deployment Form
4. Send the information to the EMC Install Base group:
l
EMC customers and partners: Email the post-deployment form to the Install Base
group at rp.registration@emc.com.
EMC employees:
n
225
Admin
Manage Users
Select Admin > Users and Roles > Manage Users to view, add, remove and modify
RecoverPoint users.
User
Role
security-admin security
security-admin
admin
admin
admin
boxmgmt
boxmgmt boxmgmt
Boxmgmt/Upgrade
You add users, edit users and remove users by selecting Admin > Users and Roles >
Manage Users.
Note
226
Only users with security permissions on page 231 can add users, and can remove
and edit permissions for users that have previously been added.
To change the passwords of pre-defined users on page 226, Switch User on page
237 and Change Password on page 236.
If you wish to implement a purely LDAP-based authentication system, you need not
give out the passwords of any pre-defined users on page 226.
Admin
Procedure
1. Select Admin > Users and Roles > Manage Users. The RecoverPoint user list is
displayed.
227
Admin
Binding to the LDAP server will fail unless at least one of the following is true:
a. The connection to the server uses LDAP over SSL (only if the Active Directory
supports SSL).
b. Anonymous binding is used.
c. Signing requirements are set to "none" in Active Directory.
Settings
Description
Local User
User Name
Password
Confirm
Password
LDAP User or
Group
User Name
Groups
User Settings
Role
Only for selected When checked, limits the access of this local user, LDAP
groups
user, or LDAP group to the specified consistency groups.
Groups
Only users with securitypermissions on page 231 can edit users. You cannot edit predefined users on page 226.
Procedure
1. Select Admin > Users and > Roles > Manage Users.
2. To edit a local user, an LDAP user or LDAP group:
l
228
Admin
c. Select one of the pre-defined roles on page 230 from the drop-down in the
User Settings section.
d. If required, modify the access to specific consistency groups by selecting Only
for selected groups.
e. Click OK.
Remove users
Note
Only users with security permissions on page 231 can remove users and you cannot
remove pre-defined users on page 226.
Procedure
1. Select Admin > Users and > Roles > Manage Users.
2. Select a user.
3. Click Remove, and click yes in the confirmation dialog box that appears.
Manage Users
229
Admin
Manage Roles
Select Admin > Users and Roles > Manage Roles to view, add, remove and modify
RecoverPoint roles.
Role
Permissions
security
Security
Read only
System configuration
Storage management
Splitter configuration
Upgrade
Data transfer
Failover
Boxmgmt
Group configuration
Target image
Read only
admin
230
boxmgmt
Boxmgmt
monitor
Read only
webdownload
Web download
Admin
Permission
Description
Splitter
Configuration
Group
Configuration
Create and remove consistency groups, and modify all group settings except
those that are included in the data transfer, target image, and failover
permissions, may bookmark images, and resolve settings conflict.
Storage
Management
Register arrays and vCenter Servers, and update storage registration details for
arrays and vCenter Servers.
Data Transfer
Enable and disable access to images, and undo writes to the image access log.
Target Image
Enable and disable access to images, resume distribution, and undo writes to
the image access log.
Failover
System
Configuration
Configure and manage e-mail alerts, SNMP, System notifications, alert rules,
licenses, syslog, and other system configuration settings.
Security
All commands dealing with roles, users, LDAP configuration, and security level.
Upgrade
Web
download
You add roles, edit roles and remove roles by selecting Admin > Users and Roles > Manage
Roles.
Only users with security permissions on page 231 can add, edit, or remove roles
added by the user.
Procedure
1. Select Admin > Users and > Roles > Manage Roles.
2. Click Add. The Add Role dialog box is displayed.
Manage Roles
231
Admin
3. Enter a new role name and set the required access permissions in the role settings on
page 232.
Table 53 Role settings
Setting
Description
Role
Permissions
Select the access permissions on page 231 to be granted to all persons who are
assigned to this role.
4. Click OK.
Only pre-defined users on page 226 with security permissions on page 231 can edit roles.
You cannot edit pre-defined roles on page 230.
Procedure
1. Select Admin > Users and Roles > Manage Roles.
2. Select a role.
3. Click Edit. The Edit Role dialog box is displayed.
232
Admin
4. Change the role name and/or select new permissions on page 231.
Remove a role
Note
Only pre-defined users on page 226 with security permissions on page 231 can remove
roles. You cannot removepre-defined roles on page 230.
Procedure
1. Select Admin > Users and > Roles > Manage Roles.
2. Select a role.
3. Click Remove, and click yes in the confirmation dialog box that appears.
233
Admin
Only users with security permissions on page 231 can configure user authentication
through an organizations Microsoft Windows Active Directory LDAP server.
RecoverPoint only accepts LDAP certificates in PEM format. To format the certificate
created on the LDAP server in PEM format, use the following procedure:
1. On the LDAP server, export a copy of the server certificate from the Active Directory
server. Use the Certification Authority application's Copy File to option to export
the certificate in Base-64 Encoded X.509 (.cer) format.
2. Copy the server certificate to a system with OpenSSL Certificate Authority software
installed. You can use any Linux or Windows system.
3. Log into the system where you copied the certificate, and run the following
command to create the PEM certificate:
n
On Linux:
> /opt/symas/bin/openssl x509 -in AD_certificate_name -out
OpenLDAP_certificate name
On Windows:
> openssl x509 -in drive:/path/AD_file.cer -inform d -out drive:/path/
OpenLDAP_file.pem
Procedure
1. Select Admin > Users and Roles > Manage User Authentication. The Manage User
Authentication screen is displayed.
Admin
Settings
Description
Enable Active
Directory Support
LDAP Configuration
Primary LDAP
server
Secondary LDAP
server
Base Distinguished Node in the LDAP tree from which to start a search for users:
Name
dc=Klaba,dc=COM
Search Base
Distinguished
Name
Root of the LDAP user search tree. The suffix of the Search Base
Distinguished Name must be the Base Distinguished Name. The format will
be similar to the following:
cn=Users,dc=Klaba,dc=COM
Binding Type:
To specify the type of binding (authentication against the Active Directory).
Bind Distinguished
Name
Distinguished name to use for initial binding when querying the LDAP
server. The format of the Bind Distinguished Name will be similar to the
following:
cn=Administrator,cn=Users,dc=Klaba,dc=COM
The bind distinguished name can be any user on the LDAP server who has
read permission for the directory in the defined search base.
Password
Password of the bind distinguished name to use for initial binding when
querying LDAP server
Upload certificate
from file
Select if you want to enter a path to an Active Directory certificate to use for
secure communication with LDAP server.
To export the certificate and format it in PEM format:
On the LDAP server, export a copy of the server certificate from the Active
Directory server. Use the Certification Authority application's Copy File to
option to export the certificate in Base-64 Encoded X.509 (.cer) format.
Copy the server certificate to a system with OpenSSL Certificate Authority
software installed. You can use any Linux or Windows system.
Log into the system to which you copied the certificate, and run the
following command:
On Linux:
> /opt/symas/bin/openssl x509 -in AD_certificate_name -out
OpenLDAP_certificate name
Manage User Authentication
235
Admin
Settings
Description
On Windows:
> openssl x509 -in drive:/path/AD_file.cer -inform d -out drive:/path/
OpenLDAP_file.pem
Advanced settings
The advanced settings are optional and can be left at their default values.
Search time limit
Default 30 sec.
3. Click Apply.
4. Test LDAP settings on page 236 to verify that you have configured LDAP correctly.
Change Password
Select Admin > Users and Roles > Change Password to change the password of the
currently logged-in user.
236
Admin
Procedure
1. Enter your current password.
2. Enter the new password in the New Password and Confirm Password fields according
to the password rules of your user's security level.
3. Click OK.
Switch User
Use the following procedure to log off, and log back in as a different RecoverPoint user.
Select Admin > Users and Roles > Switch User to log off, and log back in as a different
RecoverPoint user.
Procedure
1. Enter the username and password of the user as whom you want to log into
RecoverPoint.
Switch User
237
Admin
2. Click Login.
Only pre-defined users on page 226 with security permissions on page 231 can
change the security level of a user.
Regardless of the security level, any user who tries unsuccessfully three times to log
in will be locked out. To unlock the user, use the CLI command unlock_user. Only
users with security permission can unlock a user.
must contain a minimum of fourteen characters; at least two characters that are
lower-case, at least two characters that are upper-case, and at least two
characters that are non-alphabetical (either digits or special characters).
cannot be reused.
expire in 60 days.
When the security level is set to Basic, user passwords must have a minimum of five
characters.
Procedure
1. Select Admin > Users and Roles > Change Security Level.
2. Select either High or Basic.
3. Click OK.
238
Admin
Note
You can also access additional system analysis tools through the RecoverPoint CLI. Use
the RecoverPoint CLI to export statistics , export consolidated statistics , and load the
statistics analysis tool.
Detect Bottlenecks
Use Admin > System Analysis Tools > Detect Bottlenecks to display statistics about
system performance by group, RPA, or RPA cluster, and use the statistics to identify and
mitigate bottlenecks in transfer.
Procedure
1. Define the bottleneck detection settings on page 240. Note that in bottleneck
detection, the entered times are according to the local time and the analysis output is
according to GMT.
239
Admin
Setting
Description
Detection
Mode
Start
A user-specified date and time, where the date and time, if not specified, is
the current local time today.
Note
240
Admin
Setting
Description
Advanced
Overview
Default=no
Whether the analysis covers a broader set of system performance indicators (yes)
or not (no).
Detailed
Overview
Default=no
Whether the analysis is confined to the RPA cluster only (no) or also includes
analysis of the groups and RPAs (yes).
Peak Duration
Default=5 minutes
Includes an analysis of the periods in which the write peaks were of the specified
time duration.
Groups to
Include
Default=all
The consistency groups on which to perform the analysis. To analyze only global
statistics, without statistics on individual groups, clear all of the group
checkboxes.
Action
Description
Start New
Analysis
To stop the current analysis and display the screen containing the bottleneck
analysis settings.
Note
Detect Bottlenecks
241
Admin
Action
Description
Display
Results
Balance Load
Use this procedure to analyze the load on each RPA and display a load balancing
strategy.
Before you begin
242
Load balancing is only available on the RPA running the cluster control, or through
the floating Cluster Management IP. Load balancing will not work if the RPA running
the cluster control is down. If this RPA goes down, and then back up again, five
minutes must pass before load balancing can be performed again.
For best results, groups should be configured and replicating for seven days before
performing load balancing, so that a long enough traffic history is available for the
load balancing analysis.
Groups can be excluded from the load balancing recommendation. However, even
when excluded from the recommendation, all groups are included in the analysis.
Admin
The load balancing analysis is performed on all RPAs in the environment. If there are
three RPAs in total, and one of them goes down for a week, and it is the primary RPA
of a group included in the analysis, the load balancing recommendation calculations
are still based on the total number of RPAs, as if they were all working. In other
words, the load balancing mechanism accumulates group statistics for its
calculations, as if groups were always running on their preferred RPAs, even if
flipovers happened during the week.
Load balancing can identify cases in which distributed group segments do not
actually require four separate RPAs to run on, and recommend RPA assignments
accordingly. Distributed group segments can be run on different RPAs, or the same
RPA, and each group segment is treated as a separate group in the load balancing
analysis and recommendation. If you are not well acquainted with distributed
consistency groups, it is recommended that you become acquainted with how they
work before using the load balancing tool (see the EMC RecoverPoint Glossary of Terms
for more information on distributed consistency groups).
To ensure consistency, consistency groups are initialized when moving from RPA to
RPA. During switchover, all groups running on the preferred RPA are initialized once
when they move to the non-preferred RPA, and then another time when they switch
back to their preferred RPAs. Therefore, any re-assignment of RPAs during replication
should be carefully planned out, as not to affect the performance of the production
host applications.
Since the modification of preferred RPA assignments causes flipovers that cause
initializations, if the load balancing analysis finds that no significant changes in
workload or number of consistency groups have occurred, the mechanism will not
recommend preferred RPA re-assignment.
The load balancing mechanism smooths-out I/O statistics, so that any sudden peaks
or lapses in traffic do not cause it to recommend unnecessary changes.
Procedure
1. Select Admin > System Analysis Tools > Balance Load.
2. Select the consistency groups to exclude from the analysis.
Note
The groups that you select will be preceded by an asterisk in the load balancing
recommendation, and their traffic statistics will be included in the analysis upon
which the recommendation is based.
3. Click Start to start the analysis. A progress bar is displayed.
Balance Load
243
Admin
Action
Description
Start New
Analysis
To stop the current analysis and display the screen containing the load
balancing settings.
Note
244
Admin
A normal scope event is logged indicating that the load balancing process has
ended. The event contains a copy of the load balancing recommendation output.
6. Understand the load balancing results:
l
If the load balancing recommendation is based on less than 7 days-worth of data,
a note is displayed indicating so.
l
One or more of the following load balancing recommendations are displayed:
n
No action is necessary. The environment is stable, and groups are evenly
distributed across all RPAs.
n
Action is necessary. The environment is not stable because groups are not
evenly distributed across all RPAs. To correct this, manually modify the
Preferred RPA of each group.
n
Action may be necessary. The environment is stable, although groups are not
evenly distributed across all RPAs, and this may affect future performance. To
distribute groups evenly across all RPAs, manually modify the Preferred RPA of
each group.
l
The current preferred and recommended RPA assignments are displayed per
consistency group, along with each RPAs average throughput and incoming writerate, in a Recommended Load Distribution table.
l
Note
Balance Load
245
Admin
Two tables, Traffic per RPA before Application of Recommendation and Traffic per
RPA after Application of Recommendation, are displayed in order to aid you in the
process of understanding the performance implications on all RPAs, if you do
choose to apply the recommendation. Each RPAs average throughput and IOPS are
displayed, and the RPA with the least amount of traffic is highlighted, in each of
the tables.
246
Admin
c. Download the relevant text file(s) and store them for later reference. The load
balancing output is saved to text files with the name:
balance_load_yyyy-mm-dd_hh-mm.txt
Note
Ten load balancing output files are stored in this location at a time. When ten files
have already been stored, the older files are removed to make way for newer files.
The date and time of the output file is indicated in the filename.
d. Save the text files to a local directory for later reference.
8. Change the preferred RPAs of consistency groups based on the load balancing
recommendation:
a. Select Protection > Manage Protection.
b. In the left pane, select the group whose preferred RPA you want to change.
c. In the right pane, select the Group Policy tab.
d. Change the value of Preferred RPA according to the load balancing
recommendation. If the group is a distributed group and the load balancing
recommendation indicates so, change the value of Secondary RPAs too.
e. Click Apply.
Each time a consistency groups preferred or secondary RPAs are modified, the
group undergoes an initialization to ensure consistency. For distributed
consistency groups, if one group segment is initialized, all group segments are
initialized.
9. Verify that load balancing improved performance on page 247
247
Admin
In order to collect system information for VNX and VPLEX splitters, you must first
Attach volumes to the splitter on page 202.
Errors will occur in the following cases:
If connection with an RPA is lost while info collection is in process, no information
is collected.
n
In this case, run the process again. If the collection from the remote site failed
because of a WAN failure, run the process locally at the remote site.
n
If a simultaneous info collection process is being performed on the same RPA,
only the collector that established the first connection can succeed.
n
If an FTP failure occurs, the entire process fails.
The system information collected from RPAs also includes Dell OMSA hardware
configuration information, provided the RPAs are running on Dell PowerEdge
platforms.
To retrieve the output file containing the system information, you must log in as one
of the pre-defined users on page 226 with webdownload permissions on page 231.
It is not possible to collect VNXe system information remotely through the RPA.
Collect VNXe and RecoverPoint VNXe splitter system information manually using the
VNXe Unisphere. VNXe credentials are required for system information collection.
Procedure
1. Read Attach volumes to the splitter on page 202 for all splitters in the system.
2. Select Admin > System Analysis Tools > Collect System Information.
3. If this is your first time collecting system information, click Start. Otherwise, click
Start New Collection Process.
The Collect System Information wizard is displayed, to guide you through the
collection process.
248
Admin
NOTICE
You can also collect system information around a specific event by selecting
Dashboard > System Events. Then select an event in the event log and click Collect
System Information. The Collect System Information wizard is displayed and the
collection start and end fields are automatically set to 10 minutes before and after the
selected event.
4. Define the system information collection settings on page 249.
Table 58 System information collection settings
Setting
Description
From
Optional
Default=selected
When selected, enables the collection of system information from RPA
clusters.
RPA clusters
Optional
Default=all RPA clusters
The RPA clusters from which to collect system information. If none of the
checkboxes are selected, only the system information of the RPA cluster
from which the collection process is triggered is collected.
Note
Optional
Default=disabled
249
Admin
Setting
Description
Whether or not to include core files in the output. Core files may be large.
Subsequently, including these files in the collection process may
substantially increase collection time.
Note
Optional
Default=selected
When selected, enables the collection of system information from the
selected splitters.
Note
The IP or DNS address of the FTP server to which to upload the collection
process output file.
For example: 10.10.180.10 or ftp.EMC.com
Port
User Name
The username to use when logging into the specified FTP server.
Password
The password to use when logging into the specified FTP server.
Remote Path
Optional
The path to the copy of the output file stored on the specified FTP server.
For example: / (to access the rootdir)
Override default
filename (Not
recommended)
250
Optional
Default=disabled
Admin
Setting
Description
Whether to override the default file name of the output file placed on the
FTP server.
Note
Optional
The new file name for the output file placed on the FTP server.
Note
6. In The Test Connectivity screen, review the displayed information to verify that your
configuration settings are correct, and the system can access all RPAs and splitters:
l
Verify that the Collection Settings are configured as intended. If required, click
Back to Define Settings to edit your settings.
Verify that a green check mark exists in the Status column of all listed splitters and
RPAs, and that the text Action succeeded exists in the Details column of all listed
splitters and RPAs. If all splitters and RPAs do not have green check marks in their
Status columns, you can collect the information directly from individual hosts on
which the feature is enabled.
n
251
Admin
7. Click the Finish button to initiate the collection process. A progress bar is displayed,
and the collection process begins.
Note
Be patient. The collection process can take awhile, depending on the time span and
the amount of data being collected.
8. During the collection process, you have the following options:
Table 59 Collect system information options
Option
Description
Admin
b. Retrieve the system information. Click the Output file (HTTP) link, or Output file
(HTTPS) link, and enter the username and password of a pre-defined users on page
226 with webdownload permissions on page 231, and click Close.
Upon completion of the collection process, the output file is placed in: http://[RPA
IP address]/info or https://[RPA IP address]/info.
11.If you enabled the Copy output file to an FTP server option in step 4 on page 249, you
can now retrieve the remote copy of the output file from the FTP server:
a. Open a Web browser window.
b. Enter the FTP Server Address or DNS name of the FTP server you specified in
step 4 on page 249 into the address bar.
c. At the login prompt, enter the User Name and Password you specified in step 4 on
page 249.
d. Browse to the Remote Path that you specified in step 4 on page 249.
System Notifications
Use the System Notifications menu to manage event filters, configure system reports and
alerts and manage call home events.
System Notifications
253
Admin
254
Admin
a. Define the event filter settings according to the instructions in the following table.
Table 60 Event Filter settings
Setting
Description
Filter Name
Topic
Groups
Level
All Topics
Site
RPA
Consistency Group
Splitter
255
Admin
Setting
Description
Error are returned; Info-level events are filtered. The Warning level
includes Warning Off events.
Scope
Event IDs to
Exclude
Normal: To report selected basic events and root-cause events. A rootcause event returns a single description for a system event that can
spawn an entire set of detailed and advanced events. When
Scope=Normal, all of those detailed and advanced events are filtered
out, leaving only the normal events. This is the default setting, and in
most cases, it is sufficient for effective monitoring of system behavior.
Detailed: This category includes all events (that is, detailed and
normal), with respect to all components, that are generated for use by
users.
The IDs of the Events that are not subject to this filter.
Note
256
Admin
c. Click Finish to save the event filter and exit the wizard.
5. Configure the transfer method on page 257 for each method of transfer that you
defined.
3. Enter the values for the fields in the Email tab according to the instructions in the
following table.
Table 61 Email settings
Setting
Description
Enable Email
Notifications
Select to enable the events defined in any event filters whose method of transfer
is set to Email to be transferred to the specified server from the specified sender.
Note
Selecting this checkbox also enables the sending of email alerts to the specified
server address if you enabled both reports and alerts in the Configure System
Reports and Alerts on page 264 screen.
SMTP server
address
Enter the IP address or DNS name of the server to which to send the emails.
257
Admin
Setting
Description
Note
When you click Apply, any change to this field automatically updates the SMTP
server address field in the Configure System Reports and Alerts on page 264
screen.
Sender
address
Enter the email address that should appear in the sender field of all emails
concerning sent to the specified server regarding event notifications.
4. Click Apply.
Results
All of the event filters whose Method of Transfer includes Email will be transferred to the
recipients defined in the filter (at the frequency defined in the filter) using the specified
server address and sender.
3. Enter the values for the fields in the Syslog tab according to the following table.
258
Admin
Setting
Description
Enable Syslog
Notifications
Select to enable the events defined in any event filters whose method of transfer
is set to Syslog to be transferred to the specified servers with the specified label.
Facility
Specify target
host for
(Optional) Specify the syslog server at each RPA cluster to which you wish to
deliver notifications. The address may be either in IP or DNS format. A DNS
address will work only if a DNS server is configured in the RecoverPoint system.
4. Click Apply.
Results
All of the event filters whose Method of Transfer includes Syslog will be transferred by
Syslog using the specified target host and facilities.
3. Enter the values in the fields of the SNMP tab according to the following table.
Table 63 SNMP settings
Setting
Description
Enable SNMP
Agent
Select to enable the RecoverPoint SNMP agent to send all of the events defined
in any of the event filters whose method of transfer is set to SNMP to the
specified servers with the specified label.
Manage Event Filters
259
Admin
Setting
Description
The RecoverPoint SNMP agent must be enabled in order to send SNMP traps
(notification events) and to respond to host-initiated SNMP queries.
Allow secure
transports
only
When selected, only encrypted SNMP queries over secure transport will be
enabled; use of community strings and SNMP over an unsecured port will be
disabled.
Send event
traps
Specify trap
(Optional) The network management server to which you wish to deliver
destination for notifications. The address may be either in IP or DNS format. A DNS address will
work only if a DNS server is configured in the RecoverPoint system.
SNMP v1 RO
community
If you are using SNMP version 1, enter an SNMPv1 read-only community string to
enable the use of SNMPv1 community strings. If not enabled, only SNMPv3 user
names with passwords or certificates are enabled.
Note
260
Admin
Info
Warning
Error
The RecoverPoint SNMP trap variables and their possible values are listed in the
following table.
Table 64 RecoverPoint SNMP trap variables
Variable
OID
Description
dateAndTime
3.1.1.1
eventID
3.1.1.2
Unique event identifier; the values are listed in the Events chapter
of this Administrators Guide.
siteName
3.1.1.3
eventLevel
3.1.1.4
eventTopic
3.1.1.5
info
warning
warning off
error
error off
site
K-Box
group
splitter
management
hostName
3.1.1.6
Name of host
kboxName
3.1.1.7
Name of K Box
volumeName
3.1.1.8
Name of volume
groupName
3.1.1.9
Name of group
eventSummary
261
Admin
Note
OpenManage Server Administrator (OMSA) support is available only for systems in which
the RPAs are running on Dell PowerEdge platforms.
OMSA support provides RecoverPoint customers with the ability to:
l
Collect System Information on page 247 that includes Dell hardware configuration
information.
262
Admin
4. Modify the event filter settings according to the instructions in Create an event
filter on page 255.
5. Click Next Define Method of Transfer.
6. If necessary, in the Define Method of Transfer screen, modify the methods of transfer.
For each new method of transfer that you define, Configure the transfer method on
page 257.
7. Click Finish to save the new event filter settings and exit the wizard.
263
Admin
Depending on the severity of the event, system alerts will automatically open a service
request with EMC Customer Support and will attach the latest system report to the service
request. System alerts are sent in real-time (at the time that the event occurs), allowing
EMC to provide preemptive support for RecoverPoint issues.
System reports contain the configuration and state of the RecoverPoint system, and they
are sent to the EMC system report (SyR) database every Sunday. Only one system report
is sent at a time (containing the information of all RPA clusters) unless there are
connectivity issues between RPA clusters, or an RPA cluster in the RecoverPoint system is
unable to send a system report. In this case, the problematic RPA cluster will send its own
system report. All system reports contain the name of the RPA cluster that they are sent
from.
The following parameters are sent to the EMC system report (SyR) database and included
in any opened service requests:
264
Admin
Parameter
Description
System ID
The unique identifier of all activated RPA clusters in a RecoverPoint system. The
System ID:
l
Is generated for the first RPA cluster that is added to the system during
RecoverPoint deployment. When adding additional RPA clusters to the
system, the additional RPA clusters receive the System ID of the first RPA
cluster.
Does not change with upgrades. When upgrading to RecoverPoint 4.0 from
previous RecoverPoint versions, the System ID value is taken from the value
of Account ID in the previous RecoverPoint version.
The Software Serial ID. The unique identifier of an RPA cluster in the RecoverPoint
system. The SSID is the identification used by the install base to support EMC
equipment installed at customer sites, through the system reporting and ESRS
mechanisms.
Note
The format and function of the SSID has changed from previous RecoverPoint
versions.
The SSID is in the format <SN>EID<RPA cluster ID>, where <SN> and <RPA cluster ID>
are described in the licensing section of the EMC RecoverPoint Product Guide. Its
length can be no more than 22 characters, and therefore, the RPA cluster ID will
be truncated as required. The SSID:
Site ID
Is generated for each RPA cluster when the first license related to the RPA
cluster is added to the system. When additional licenses are added to the
system, the SSID of the RPA cluster does not change.
If no license was added for an RPA cluster, the SSID of that RPA cluster will
be empty.
Does not change with upgrades. When upgrading to RecoverPoint 4.0 from
previous RecoverPoint versions, the SSID value is taken from the value of the
SSIDs in the previous RecoverPoint version.
Does not change even if the SSID SN from which it was generated no longer
exists in any of the installed licenses.
Is obtained from the value of the <Site_Info> parameter in the license file
variables. Its value is set by the first installed license for an RPA cluster.
265
Admin
Parameter
Description
Note
If no license was installed for an RPA cluster, the Site ID of that RPA cluster
will be empty.
l
Does not change even if the <Site_Info> from which it was generated no longer
exists in any of the installed licenses.
Best practice is to keep both system reports and alerts, and compression and
encryption enabled.
System reports and alerts will only be sent provided a method of transfer (SMTP,
ESRS, or FTPS) is configured. You can configure the method of transfer using the
Getting Started Wizard or by selecting Admin > System Notifications > Configure
System Reports and Alerts.
To transfer system reports and alerts using SMTP or ESRS, ensure that port 25 is open
and available for SMTP traffic.
To transfer system reports and alerts using FTPS, ensure that ports 990 and 989 are
open and available for FTPS traffic.
To send system reports and alerts, a permanent RecoverPoint license must exist in
the system; system reports and alerts will not work with a temporary license.
By default:
l
System reports and alerts are sent through SMTP, but they can be configured for
transfer through a customer's ESRS server, or RecoverPoints built-in FTPS server.
System reports and alerts are compressed and encrypted with RSA encryption using a
256-bit key before they are sent.
Procedure
1. Select Admin > System Notifications > Configure System Reports and Alerts.
266
Admin
2. Ensure that the Enable System Reports and Alerts checkbox is selected, and the radio
button is set to System reports and system alerts .
3. Ensure that the Compression and Encryption checkboxes are selected.
4. Define the transfer method.
l
267
Admin
Note
The connectivity test, if successful, opens a service request containing call home
event number 30999 and sends an email to the specified verification email address
from EMC Customer Support to verify that the system reports mechanism (SyR) has
been successfully configured.
4. Wait ten minutes.
5. Select Dashboard > System Events and look for event 1020 Failed to send system
report.
268
If this event does not appear in your event logs, the system notifications
mechanism has been properly configured.
If you do receive event 1020; check whether there is an issue with your selected
method of transfer. If a problem exists, fix it, Configure system reports and
alerts on page 266 and click Test Connectivity again. If problem persists contact
EMC Customer Support.
Admin
RecoverPoints call home feature is a proactive online service capability of RPAs that
enables RPAs to continuously monitor their own health, and the health of the
RecoverPoint system, using a pre-defined set of event-filtering rules. The call home event
mechanism automatically notifies EMC Customer Support of potential issues, using
secure transmissions. If a serious problem arises, the call home mechanism
automatically detects it and opens a service request with EMC Customer Support. When
the service request is received, EMC Customer Support pro-actively engages the relevant
EMC personnel to start working on the issues resolve, and immediately start working with
the relevant customer parties, or uses a configured ESRS gateway, to resolve the issue.
The call home event mechanism is customizable so that any specific environment or
specific customer requirement can be accommodated. EMC Customer Support have the
ability to create additional call home events, as required, to meet a specific customer's
needs. They can also permanently disable or temporarily suppress call home events. For
example, if an RPA cluster keeps reporting a problem that EMC Customer Support are
already aware of and have scheduled a customer visit to fix next week, the event
reporting the issue can be suppressed for a period of 2 weeks.
269
Admin
Whenever the logic of a call home event script cannot be fulfilled, RecoverPoint event
8001 is generated in the event logs.
270
RecoverPoint ships with a set of pre-defined call home events that are enabled by
default.
The call home events mechanism is not available when the RPA running the Cluster
control is down.
The call home events mechanism is disabled during upgrade and while RecoverPoint
is in maintenance mode. The call home events mechanism discards any events
issued while the system is in maintenance mode.
The call home events, and the last call home time for each event, will survive RPA
failure. In the case of a disaster, all of the user-defined call home events, and any call
home events that may have been logged up until the time of the disaster, are
retrievable. This information will not, however, survive repository volume format.
The call home event mechanism is based upon with the most current system settings.
Therefore, if one of the rules in a call home event references a system property (e.g.
replication type), the value of the property must be the current value of the property
in the system settings. The call home mechanism does not save previous settings. If a
rule refers to a system entity (e.g. group, splitter, etc), and the entity has been
deleted from the system (and therefore, the system settings), no call home event is
issued.
The call home events mechanism automatically includes the contact information
defined in the contact_info parameter of the config_user_account CLI
command in the Service Request which is opened with EMC Customer Support. In
order to ensure a swift turnaround time, ensure that the contact_info parameter
contains both the email address and the telephone number of the person at your
company that is designated to mitigate RecoverPoint support situations. If contact
information is not specified and a call home event is triggered, a Service Request is
Admin
still opened, but it will not contain this information, which will elongate the cases
time to resolve.
Suppress one call home event until a specific date and time
Use the following procedure to suppress one call home event for a specific period of time.
Procedure
1. Select Admin > System Notifications > Manage Call Home Events
2. Select the event.
3. In the Status area of the bottom pane, select the Suppress Until radio button, and set
the date and time fields.
4. Click Apply.
NOTICE
Note the change in the event status in the Status column of the event table. To enable
suppressed events, select the event in the table, change the date and time fields to
the current date and time, and click Apply.
Suppress all call home events until a specific date and time
Use the following procedure to suppress all call home events for a specific period of time.
Procedure
1. Select Admin > System Notifications > Manage Call Home Events
Manage Call Home Events
271
Admin
4. In the Suppress All dialog box, set the date and time fields, and click OK.
NOTICE
Note the change in the status of all of the events in the Status column of the event
table. To enable all of the suppressed events, click Suppress All, set the date and
time fields to the current date and time, and click OK.
272
CHAPTER 7
Support
This section describes all of the RecoverPoint support options and how to quickly access
your Recoverpoint documentation, product support, or online community of users from
within Unisphere for RecoverPoint.
l
RecoverPoint Support..........................................................................................274
Support
273
Support
RecoverPoint Support
Unisphere for RecoverPoint product support is accessed through the Support menu.
Option
When to Use
RecoverPoint
Documentation
EMC Online
Support
Download the latest EMC products, get and manage licenses, open and track
service requests, chat with EMC technical support, view and manage your
company information, or contact EMC.
The
RecoverPoint
Community
Interact with other RecoverPoint users and share best practices and tips, or
communicate directly with the experts responsible for the EMC RecoverPoint
family.
RecoverPoint Documentation
Click Support > RecoverPoint Documentation to display the RecoverPoint documentation
on EMC Online Support.
When clicked, the RecoverPoint documentation page is displayed, enabling you to search
for the RecoverPoint documentation that you require by RecoverPoint version, content
type, support task or OS.
274
Support
When clicked, the EMC Online Support page is displayed, enabling you to:
275
Support
Register your product to access software downloads or obtain and manage license
keys.
Track, view, manage and create service requests for yourself and your company.
View and manage your company information - Sites, products, contacts and
contracts.
Download the new Mobile App to manage and track your Service Requests anytime,
anywhere.
Contact EMC
Learn about EMC's Maintenance, Warranty Information and Parts Return Site.
Learn how to fully leverage the capabilities of the new EMC experience.
Connect with EMC customers and technical experts in this worldwide community of
your peers.
Submit your ideas for improving serviceability on EMC products. SER is transparent
data repository where all requests can be submitted, managed and tracked.
276
Support
When clicked, the RecoverPoint community page is displayed, enabling you to join the
community, start a discussion or view feeds.
277
Support
278
CHAPTER 8
Troubleshooting
This section describes occurrences in RecoverPoint, how to identify them, and how to
mitigate them from a users perspective.
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Troubleshooting
279
Troubleshooting
First-time initialization can cause changes in the partition table of the copy volume or
volumes. In a Windows environment, you must clear the OS cache before changing the
partition table of a copy volume. To clear the OS cache, disable the LUN or LUNs on which
the volume resides, and re-enable it. You can do so from the Disk drives interface of the
Windows Device Manager.
You can initialize new consistency groups by creating a backup of your production
volumes, physically transferring them to the remote site, and copying the backup images
onto the remote storage volumes.
During this process, applications at the production site can be running or not. Although
transfer is paused during this process, unless the production host is completely shut
down during the creation and physical transfer of the production image to the remote
site, the host applications keep writing to storage. In this time, the production and copy
volumes become inconsistent, and any writes to production volumes during this process
are subsequently synchronized, upon completion of the process, and start of transfer.
Only synchronizing the changes made to the production volumes during this time results
in a relatively small amount of additional traffic, and takes substantially less time than to
synchronize over IP or Fibre Channel.
Troubleshooting
2. Create a new consistency group, and define replication and journal volumes using
Protect Volumes on page 53 or Policy Templates on page 68.
3. Pause transfer on page 128 for the group, to stop the replication of data from
production to the copy.
4. In the RecoverPoint CLI, run the clear_markers command to inform the system
that the copy volume at the remote RPA cluster is known to be identical to its
corresponding production volume, and a full volume sweep synchronization is not
required.
NOTICE
For the selected consistency groups, clearing markers clears all markers of the
selected copy from the production journal volume; that is, it treats the selected copy
as identical to the production source. Caution: To clear markers, the production
source and the selected copy volume must be absolutely identical. If they are not, the
inconsistencies will remain. The clear markers command should be used only with
extreme caution. It is useful when a production source and a copy have been
synchronized manually by initializing from backup and adequate bandwidth is not
available to synchronize using the storage network. Otherwise, the best practice is not
to use this command.
5. Create a block-based backup of the production volumes.
6. Physically transfer the backup to the remote cluster.
7. At the remote RPA cluster, in Unisphere for RecoverPoint:
a. Test a Copy on page 147 to enable image access to the image at the remote RPA
cluster in Logged Accessmode, and enable direct access. Do not select the prereplication image.
If your consistency group contains more than one non-production copy, for all
other copies, the journal is erased and all journal history is lost.
b. Click Finish to close the wizard without disabling image access.
8. Restore the backup onto the remote copy volumes. The backup image becomes the
pre-replication image.
9. In Unisphere for RecoverPoint:
a. Select Recovery > Manage Recovery.
b. Select Finish Testing from the Select Next Action combo box of the accessed copy
at the remote RPA cluster, to disable image access and start transfer to the copy.
Upon start of transfer, the system synchronizes the data of the copy volume with
the corresponding production data.
10.At the remote RPA cluster, if the group contains more than one non-production copy,
Start transfer on page 131 to all of the other copies.
281
Troubleshooting
If your host applications experience delays, loss of client connectivity, or slow response
times, check whether the value of the regulate_application parameter in the
config_link_policy CLI command is set to yes (default is no).
Before disabling application regulation, make sure you are familiar with replication
modes and understand the implications of doing so.
Use the initialization from backup procedure First-time initialization is taking too
long on page 280.
Add volumes to the copy journal. Note that the additional journal volumes must be
permanent or a full sweep will occur when the volumes are removed.
Troubleshooting
Event number 4133 (Copy regulation has started)is displayed in the event log.
In the consistency group Status tab of the GUI, the Role of a copy becomes Regulated
and is displayed in red.
Release all groups at all copies from this state by running the
unregulate_all_copies command from the CLI.
Check previous event logs. Look for repetitive errors that may indicate a specific
problem in the system.
Check SAN/IP events outside of RecoverPoint, as instabilities may not originate from
RecoverPoint.
If regulation persists, Collect System Information on page 247 and contact EMC
Customer Support for further instruction.
Event 4132 (Copy regulation has ended due to a user action or internal timeout.) is
displayed in the event log.
The Role of a copy is no longer displayed in red in the consistency group Status tab.
Permanent High-loads - In these cases, RecoverPoint stops and waits for a user action
in order to come out of high load.
Temporary High-loads - In these cases, RecoverPoint tries to recover from the high
load and will keep trying until the condition that triggered the high load changes.
283
Troubleshooting
Warning events are logged specifying that the copy is experiencing high load.
In the consistency group or copy Status tab, the transfer state on page 43 of a
copy becomes High load.
In the Consistency Group Transfer State widget in the Dashboard, a state of Init
(orange) is displayed for the group.
During copy testing in RecoverPoint products with a splitter, if a user accesses a copy
in logged or virtual access modes for a long time and the queue of snapshots waiting
for distribution of the journal reaches its maximum capacity, in this case the system
will Pause Transfer and wait for user input.
When the system is in initialization mode, and the journal volume has reached its
maximum capacity, while the value of the allow_long_resync parameter of the
config_copy_policy CLI command is set to no.
Warning events are logged specifying that the copy is experiencing high load.
The transfer state on page 43 is displayed as High load. You can display the transfer
state:
n
Troubleshooting
During copy testing in RecoverPoint products with a splitter, if the user accessed a
copy in logged or virtual access mode for a long time and the queue of snapshots
waiting for distribution of the journal reached its maximum capacity, you should
disable image access or enable direct access according to image access modes.
If the system was in initialization mode, and the journal volume became full, while
the value of the allow_long_resync parameter of the config_copy_policy
CLI command is set to no.
Warning events are logged specifying that the copy is no longer experiencing high
load.
The transfer state on page 43 is no longer displayed as High load. You can display the
transfer state:
n
When the copy or journal volumes are not fast enough to handle distribution
285
Troubleshooting
Warning events are logged specifying that the copy is experiencing high load.
The transfer state on page 43 is displayed as high load, followed by a progress status.
You can display the transfer state:
n
Warning events are logged specifying that the copy is no longer experiencing high
load.
The transfer state on page 43 is no longer displayed as High load. You can display the
transfer state:
n
286
Troubleshooting
If you are connected to an RPA cluster at the production site, note the value of the
Speed of reading from local user volume during
initialization parameter.
If you are connected to a remote RPA cluster, note the value of the Speed of
reading from remote user volume during initialization
parameter.
The higher the throttling level, the longer initialization will take.
How do I know reboot regulation is happening?
287
Troubleshooting
I/O throttling can only be configured using the RecoverPoint CLI or REST API. You
cannot configure I/O throttling using the Unisphere for RecoverPoint GUI.
I/O throttling can only be configured for arrays and vCenter Servers that have been
mapped to, and are therefore seen by, the RPA cluster.
When selecting to configure I/O throttling for all arrays or vCenter Servers seen by an
RPA cluster, the performance of all consistency groups residing on the same array or
vCenter Server is affected. For example, setting the throttling level to high limits the
I/O rate of all RPAs in an RPA cluster to a maximum read-rate of 50 MBps, per array or
vCenter Server.
The higher the throttling level, the longer initialization will take. Ensure that a low
throttling level is insufficient before setting the throttling level to high.
You must be logged into RecoverPoint as an admin user to configure I/O throttling.
To ensure efficiency, RecoverPoint sends I/Os to storage in parallel. The I/O throttling
mechanism regulates parallel I/Os in the following way:
When set to low, the I/O throttling mechanism allows for a maximum of 10 MB of
parallel I/Os per second.
When set to high, the I/O throttling mechanism allows for a maximum of 1 MB of
parallel I/Os per second.
When set to custom, the I/O throttling mechanism allows for a maximum of
<CustomValue>/20 of parallel I/Os. For example, if the custom value is 40 MBps,
the I/O throttling mechanism will allow for 40/20=2 MB of parallel I/Os per
second.
In previous RecoverPoint versions, I/O throttling was only available per RPA cluster.
Therefore:
n
288
Troubleshooting
Note
See the RecoverPoint 4.0 version of the EMC RecoverPoint Administrators Guide
and the EMC RecoverPoint CLI Guide for the I/O throttling settings if at least one
of the RPA clusters in your RecoverPoint system is running a RecoverPoint
version prior to 4.1.
Use the following procedure to enable I/O throttling for a specific array or vCenter Server.
Procedure
1. Run the config_io_throttling command in the RecoverPoint CLI.
2. Select the RPA cluster to which the array or vCenter Server is mapped.
3. Select the array or vCenter Server from the list.
4. Set the throttling level:Set the throttling level to low to limit the I/O rate of the
specified array or vCenter Server to a maximum read-rate of 200 MBps.
l
Set the throttling level to high to limit the I/O rate of the specified array or vCenter
Server to a maximum read-rate of 50 MBps.
Set the throttling level to custom, and specify the custom value in MBps to limit
the I/O rate of the specified array or vCenter Server to any other read-rate.
Set the throttling level to none to disable I/O throttling on the specified array or
vCenter Server.
1. To enable I/O throttling for all arrays or vCenter Servers mapped to an RPA cluster:
5. Run the config_io_throttling command in the RecoverPoint CLI.
6. Select the RPA cluster to which the arrays and/or vCenter Servers are mapped.
7. Scroll down to the bottom of the list of seen arrays and vCenter Servers, and select the
last option in the list.
8. Set the throttling level:
l
Set the throttling level to low to limit the I/O rate of all RPAs in an RPA cluster to a
maximum read-rate of 200 MBps, per array.
Set the throttling level to high to limit the I/O rate of all RPAs in an RPA cluster to a
maximum read-rate of 50 MBps, per array.
Set the throttling level to custom, and specify the custom value in MBps to limit
the I/O rate of all RPAs in an RPA cluster to any other read-rate, per array.
Set the throttling level to none to disable I/O throttling of all RPAs in the specified
RPA cluster.
Results
The read-rate of the RPA on which the consistency group is running is limited to 50 MBps,
200 MBps, or the specified custom setting divided by the number of RPAs in the cluster.
289
Troubleshooting
Replication
Journal
In VNX storage systems, the number of LUNs per storage group is limited. This limit is
typically 256, 512, or 1024, depending on the specific VNX model, as presented in the
EMC RecoverPoint Release Notes.
You calculate in advance the number of LUNs that you expect to need to support the
replication, journal, and repository volumes for your RecoverPoint configuration, and
that number exceeds the number of LUNs currently available.
Troubleshooting
RecoverPoint Fiber Channel port that uses virtual ports is attached must be
configured as a Fabric Loop port.
b. Create RPA-to-Storage zones with the new WWNs in the same way that existing
WWNs are already zoned.
5. Repeat step 3 on page 290 and step 4 on page 290 for each RPA cluster in your
RecoverPoint system.
Results
The RPAs automatically create new storage groups, and register the new WWNs to those
storage groups.
How can I verify that the storage groups were added successfully?
Upon successful completion of registration (which may take between several minutes
and an hour), the event, Registration of all the site RPAs initiators with the CLARiiON array
is complete., is generated for each site.
The journal is deleted and a full sweep of the consistency group occurs.
How can I verify that the storage groups were added successfully?
291
Troubleshooting
Agent Rev:
Name:
Desc:
Node:
Physical Node:
Signature:
Peer Signature:
Revision:
SCSI Id:
Model:
Model Type:
Prom Rev:
SP Memory:
Serial No:
SP Identifier:
Cabinet:
7.32.0 (5.2)
K10
A-APM00120701240
K10
2998645
2998612
05.32.000.4.007
0
VNX7500
Rackmount
8.10.00
24576
APM00120701240
A
SPE5
NOTICE
292
Troubleshooting
-----------------top-level-assembly
-------------FNM00104500511
/engines/engine-1-1:
Name
Value
------------------ -------------top-level-assembly FNM00104500511
293
Troubleshooting
Index
State
ConnState
ActivationTime
Start-Time
SW-Version PSNT
EncryptionMode
xbrick414
active
connected
Wed Jun 10
17:30:15
2015
Wed Jun 10
17:30:15
2015
4.0.0-54
XIO00150201280
disabled
Figure 33 on page 295 contains some common examples of RecoverPoint licenses. One
license file can include multiple licenses. Each license starts with the word INCREMENT.
294
Troubleshooting
The following table described the variables in the license file, and their possible values.
Table 67 License file variables
Variable
Description
Examples
{Type}
{Prod}
RP.xx.REM.xx
RP.xx.LOC.xx
RP.CL.xxx.xx
RP.SE.xxx.xx
CL for RecoverPoint/CL
RP.EX.xxx.xx
EX for RecoverPoint/EX
SE for RecoverPoint/SE
VMAX
VPLEX
RP.xx.xx.VNX5700
295
Troubleshooting
Variable
Description
l
{Version}
{Expiration}
Expiring:
- Evaluation: Up to 90 days
Examples
1.0
l
15-dec-2014
permanent
12 (for 12 TB)
{LockingID}
{Capacity}
{Unit}
296
permanent
A System ID
TB
Troubleshooting
Variable
Description
Examples
{Customer}
{Issued}
15-Dec-2014
{Site_info}
{Sign}
You can use iostat (UNIX) or perfmon (Windows) to determine the value for D data per
second.
Calculate your required journal size
297
Troubleshooting
The default image access log size is 20%, and it can only be changed using the
RecoverPoint CLI.
See the EMC RecoverPoint Release Notes for the minimum and maximum journal size
limitations.
See the EMC RecoverPoint Release Notes for the minimum and maximum journal size
limitations, when snapshot consolidation is enabled.
For example, if an application has the following requirements:
l
An image access log size that is 20% of the total journal size
10 daily snapshots
2 weekly snapshots
3 monthly snapshots
The minimum size for the journal at this copy would be calculated as (if performance data
was unavailable for the localities of reference):
MinJournalSize = 6
+ { [0.5*(60*60/1024)]
* 12
+ [24 + (10-1)*24*(1-0.20)]
+ [7*24*(1-0.20)+ (2-1)*7*24*(1-0.20)*(1-0.20)]
+ [7*24*4*(1-0.20)*(1-0.20)+(3-1)*28*24*(1-0.20)*
(1-0.20)*(1-0.20)]
/ (1-0.25)
/ [1-(0.20 + 0.10)]
* (1-0)}
Where:
298
Troubleshooting
Field
Description
MinJournalSize
SpaceForMarkingAndReplication
Note
Note
48
299
Troubleshooting
Field
Description
Note
Note
300
Troubleshooting
Field
Description
Note
301
Troubleshooting
Field
Description
Note
Troubleshooting
Field
Description
1 - %MonthlyLoR, For example: 1 - 0.20 (if
performance data is not available).
Note
spaceAfterImageAccessProcesses The percentage of the journal space that is left after the space
reserved for the logged (%LAProcess) and virtual
(%VAProcess) image access processes is subtracted.
Note
The percentage of the journal space that is left after the space
reserved for the snapshot consolidation process is
subtracted, where the snapshot consolidation process uses
25% of the total journal space.
This value is constant, and is calculated as: 1 - 0.25
spaceAfterCompression
Note
303
Troubleshooting
Field
Description
l
You can use iostat (UNIX) or perfmon (Windows) to determine the value for data per second.
Configuration issues. If the host replicates data without going through a RecoverPoint
write splitter, as in ESX environments, for example.
304
Troubleshooting
consistent with its production source. In such cases, you should check the integrity of
the group Using the integrity check tool on page 306 to ensure data consistency
between the groups production and copy volumes.
l
Periodically
You can validate replication integrity periodically Using the periodic integrity
validation tool on page 307 to ensure data consistency between all of the production
and copy volumes in your RecoverPoint system on an ongoing basis.
The integrity check process only runs on the groups primary RPA.
The integrity check process reads all of the data of all of the production and copy
volumes of the group, which can put extra load on the production storage, and then
compares their signatures, which can put extra load on the WAN. The extra load
placed on the WAN may lead to high load or WAN disconnection, which will cause the
integrity check to stop before completing the process on all consistency group
volumes.
How it works
When enabled, the integrity check tool:
1. Reads a section of the groups production and copy volumes.
2. Creates hash signatures of that section of the production and copy volumes.
3. Compares the two signatures.
4. Repeats this process as many times as required across all group volumes.
5. If no inconsistency is found, event 4107 - Integrity check completed successfully, is
logged.
NOTICE
If at any time during this process a possible inconsistency is found, event 4108 - A
possible replication integrity issue has been identified is logged.
The periodic integrity validation tool is only enabled if all RPA clusters in your
RecoverPoint system are running RecoverPoint 4.1 SP1 or later.
How the integrity check tool works
305
Troubleshooting
To temporarily disable or enable all of the link settings in your entire RecoverPoint
system that were set Using the periodic integrity validation tool on page 307 see Can
I disable or enable integrity validation globally? on page 307.
How it works
For each copy whose integrity you want to periodically validate, you will need to run the
config_periodic_integrity_validation CLI command, specify the copy name,
and select a mode of operation.
The following modes are available:
l
Light: In this mode, each RPA will read 1MB every 5 seconds.
Heavy: In this mode, each RPA will read 10MB every 0.5 second.
Note
When using this mode, the maximum degradation in total performance (throughput
and IOPs) should not exceed 10%. However, using this mode is not recommended,
and this mode should not be used without explicit instruction from EMC Customer
Support.
l
Disabled
When enabled, the tool randomly selects an area of the production storage protected by
each consistency group:
1. Each RPA sequentially scans the volumes of the consistency groups that are running
on it (selecting a different group each time) and randomly selects an area of the
storage protected by the group. Each volumes beginning and end receive priority in
the random selection process.
2. If the randomly selected area of a production volume has already been replicated but
has not been written to the target storage yet, this area is not scanned and is
considered consistent.
3. If a possible replication inconsistency is detected, the tool will re-scan the same area
of the production volume to ensure that the results of the first scan are correct.
4. If the second scan detects a possible replication integrity issue, event 4165 is
logged, and a call home event will automatically open a service request with EMC
Customer Support with the relevant consistency group name, volume name and
metadata, while the data itself is written in the RPA logs.
5. If no replication integrity issues are detected no events are logged.
Note
Both integrity validation tools can only be accessed using the RecoverPoint CLI.
Troubleshooting
Setting the integrity validation mode to heavy might affect performance. Consult EMC
Customer Support before setting the mode to heavy.
l
307
Troubleshooting
command and setting enabled to no, will override all of link-level settings. Running this
command and setting enabled to yes, will use the configured link-level settings.
To display whether or not global periodic integrity validation is enabled, run the
get_global_policy CLI command.
Procedure
1. Select Protection > Manage Protection
2. Select a group
3. Click Add Copy and follow the instructions in Add a copy on page 116.
4. Add a standby production copy
Results
The group becomes a MetroPoint group.
Note
Follow the instructions in Remove a copy on page 123 and remove the standby
production copy to turn a MetroPoint group into a regular group.
308
CHAPTER 9
Events
This section describes all of the events issued by the RecoverPoint system.
l
l
l
Normal Events.....................................................................................................310
Detailed events................................................................................................... 320
Advanced events.................................................................................................360
Events
309
Events
Normal Events
The following table contains the Normal scope events that are issued by the RecoverPoint
system.
Table 69 Normal scope events
ID
Topic
Level
Summary
More Details
User Action
1002
Mgmt
Info
None
1010
Mgmt
Warning
1012
Mgmt
Warning
License grace period expires in less than <expiration interval> days. You
must obtain a new RecoverPoint
license.
1013
Mgmt
Error
License expired
None
1021
RPA
Error
None
2000
RPA
Cluster
Info
Cluster management
running on RPA
None
3002
RPA
Warning
Cluster management
switched over to RPA
None
3007
RPA
Warning
off
RPA is up
None
3014
RPA
Warning
None
3022
RPA
Warning
off
None
3023
RPA
Warning
None
3155
Group
Info
None
3156
Group
Info
None
3170
Mgmt
Info
None
3171
Mgmt
Info
None
4000
Group
Info
Group capabilities OK
None
310
Events
ID
Topic
Level
Summary
More Details
User Action
4001
Group
Warning
None
4003
Group
Error
Group capabilities
problem
None
4007
Group
Info
None
4008
Group
Warning
4009
Group
Error
None
4010
Group
Info
None
4015
Group
Info
Transferring latest
snapshot
4016
Group
Warning
Transferring latest
snapshot
4017
Group
Error
Transferring latest
snapshot
4018
Group
Warning
Transfer of latest
snapshot complete
4019
Group
Warning
4020
Group
Warning
off
None
4021
Group
Error
Initialization paused
4022
Group
Error off
Initialization resumed
None
4023
Group
Error
Transfer paused
4024
Group
Error off
Transfer restarted
None
Normal Events
311
Events
ID
Topic
Level
Summary
More Details
User Action
4025
Group
Warning
4026
Group
Warning
off
None
4027
Group
Error
4028
Group
Error off
None
4040
Group
Error
Journal error
4041
Group
Info
None
4042
Group
Info
None
4043
Group
Warning
None
4044
Group
Error
None
4051
Group
Info
Resuming distribution
4054
Group
Error
4057
Group
Error
4062
Group
Info
None
4063
Group
Warning
None
4064
Group
Error
None
4080
Group
Warning
None
4081
Group
Warning
off
None
4084
Group
Info
Markers cleared
None
4085
Group
Warning
None
4086
Group
Info
Synchronization started
None
4087
Group
Info
Synchronization
completed
None
4091
Group
Error
312
Events
ID
Topic
Level
Summary
More Details
User Action
automatically undone.
Alternatively, use the undo writes
command to undo the same writes;
image access remains enabled.
- If, however, you wish to retain the
writes that were added to the copy
image while image access has been
enabled, you must increase the size
of the copy journal by adding one or
more volumes to the journal.
Alternatively, you can set the image
access mode to direct; however, in
that case, the copy journal is
erased, and a full sweep
resynchronization will be required
to restore consistency between the
production and copy images.
- To help prevent this problem from
recurring, increase the size of your
image access log, using one or both
of the following:
- - Add volumes to the journal.
- - Modify the policy setting for the
portion of the journal allocated to
the image access log. This is
permitted only when image access
is disabled.
4095
Group
Info
4097
Group
Warning
Starting three-phase
distribution
4098
Group
Warning
off
4099
Group
Warning
Starting long
initialization
None
Normal Events
313
Events
ID
Topic
Level
Summary
More Details
User Action
4110
Group
Info
None
4111
Group
Info
None
4112
Group
Info
4113
Group
Info
None
4114
Group
Info
4115
Group
Error
4116
Group
Error
4118
Group
Error
None
4119
RPA
Error
None
4120
Group
Warning
4122
Group
Error off
4124
Group
Error off
4129
Group
Warning
4130
Group
Warning
off
4135
Group
Info
Copy entered
maintenance mode
4136
Group
Info
4137
Group
Info
Snapshot consolidation
has been successful
None
4138
Group
Warning
Snapshot consolidation
failed
None
314
Events
ID
Topic
Level
Summary
More Details
User Action
4140
Group
Info
None
4141
Group
Info
Snapshot consolidation
policy change
4142
Group
Info
Snapshot consolidation
request registered
None
4150
Group
Error
Phoenix System RP
communication error
None
4151
Group
Info
Phoenix System RP
settings change
None
4152
Group
Info
4153
Group
Info
4154
Group
Warning
None
4155
Group
Info
Initializing Phoenix
System RP
None
4156
Group
Warning
4157
Group
Error
4159
Group
Info
4160
Group
Info
None
4161
Group
Info
Short initialization
started
4162
Group
Info
4174
RPA
Cluster
Info
4210
RPA
Cluster
Warning
VM no longer being
replicated
None
4211
RPA
Cluster
Warning
VM partially replicated
None
Normal Events
315
Events
ID
Topic
Level
Summary
More Details
4212
RPA
Cluster
Info
VM is fully replicated
None
4213
RPA
Cluster
Error
None
4300
RPA
Cluster
Warning
4301
RPA
Warning
None
4302
Group
Warning
Journal is unable to
handle incoming data
rate
None
4303
Group
Warning
None
4304
Group
Warning
Remote storage is
unable to handle
incoming data rate;
regulating distribution
In distribution, there are reads and If the event recurs, try to configure
writes to the journal and replication remote storage for better
volumes on the remote storage. If
performance.
I/O access to this storage is too
slow, high load states may occur.
4305
Group
Warning
4306
RPA
Cluster
Warning
This may increase RPO, and cause a If this event recurs, examine the
high-load state.
WAN/FC link for possible high
latency or packet loss. Consult your
network administrator if needed.
4307
RPA
Cluster
Warning
4308
RPA
Cluster
Warning
4309
RPA
Warning
316
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
4310
Group
Warning
4312
Group
Error
Switching to virtual
access
4400
RPA
Cluster
Warning
off
None
4401
RPA
Warning
off
None
4402
Group
Warning
off
Journal handles
incoming data rate
successfully
None
4403
Group
Warning
off
None
4404
Group
Warning
off
4405
Group
Warning
off
None
4406
RPA
Cluster
Warning
off
None
4407
RPA
Cluster
Warning
off
4408
RPA
Cluster
Warning
off
None
Normal Events
317
Events
ID
Topic
Level
Summary
More Details
User Action
resynchronization is
normal
4409
RPA
Warning
off
4410
Group
Warning
off
4412
Group
Error off
None
5013
Splitter
Error
Splitter is down
None
5014
Splitter
Info
Writes to replication
volumes disabled, reads
are allowed
None
5015
Splitter
Error off
Splitter is up
None
5016
Splitter
Warning
None
5017
Splitter
Error off
Splitter version is
supported
None
5018
Splitter
Error
None
5019
Splitter
Warning
Writes to replication
volumes disabled, reads
are allowed
None
5020
Splitter
Error
Writes to replication
volumes disabled, reads
are allowed
None
5029
Splitter
Error
5030
Splitter
Error
None
5031
Splitter
Warning
5032
Splitter
Info
Splitter splitting to
replication volumes
None
5035
Splitter
Info
Writes to replication
volumes disabled
None
5036
Splitter
Warning
Writes to replication
volumes disabled
None
5037
Splitter
Error
Writes to replication
volumes disabled
None
5038
Splitter
Info
None
5039
Splitter
Warning
None
318
None
Events
ID
Topic
Level
Summary
More Details
User Action
5040
Splitter
Error
None
5041
Splitter
Info
None
5042
Splitter
Warning
None
5043
Splitter
Error
None
5045
Group
Warning
5046
Splitter
Warning
5052
Splitter
Error
5053
Group
Error off
5059
Splitter
Info
5060
Splitter
Info
5061
Splitter
Info
5079
RPA
Error
Phoenix System RP
cluster error
None
5080
RPA
Error off
Phoenix System RP
cluster is OK
Normal Events
319
Events
ID
Topic
Level
Summary
More Details
5081
RPA
Error
Phoenix System RP
None
cluster not responding to
requests
5082
RPA
Info
Phoenix System RP
None
cluster configuration has
changed
7111
RPA
Cluster
Error
Volumes switched on
storage
7112
Splitter
Error
Volumes switched on
storage
9999
RPA
Info
Test event
None
18036
RPA
Error
Negotiation of transfer
protocol failed again
User Action
Detailed events
The following table contains the Detailed scope events that are issued by the
RecoverPoint system.
Table 70 Detailed scope events
ID
Topic
Level
Summary
More Details
1000
Mgmt
Info
User logged in
None
1001
Mgmt
Warning
None
1003
Mgmt
Warning
None
1004
Mgmt
Warning
1005
Mgmt
Warning
1006
Mgmt
Info
Settings changed
320
None
User Action
Events
ID
Topic
Level
Summary
More Details
1007
Mgmt
Info
None
1008
Mgmt
Info
None
1009
Mgmt
Info
None
1011
Mgmt
Error
1014
Mgmt
Info
User bookmarked an
image
None
1017
Mgmt
Warning
1018
Mgmt
Warning
off
RPA multipathing
problem fixed
None
1019
Mgmt
Warning
None
1020
Mgmt
Warning
None
1031
Mgmt
Warning
None
1032
Mgmt
Info
None
1033
Mgmt
Warning
None
1034
Mgmt
Info
None
1035
Mgmt
Error
None
1036
Mgmt
Info
None
3000
RPA
Warning
off
RPA successfully
communicating with
cluster
None
3001
RPA
Warning
RPA problem
communicating with
cluster
User Action
Detailed events
321
Events
ID
Topic
Level
Summary
3005
RPA
Cluster
Error
3006
RPA
Cluster
Error off
3008
RPA
Warning
None
3030
RPA
Warning
None
3036
RPA
Error
None
3037
RPA
Error off
3038
RPA
Cluster
Info
Director automatically
added
None
3040
RPA
Cluster
Info
None
3041
RPA
Cluster
Info
None
3157
Group
Error
3158
Group
Error off
3159
RPA
Cluster
Error
3160
Group
Error
3161
Group
Error
3162
Group
Error
None
3163
Group
Error
None
4056
Group
Error
No image in journal
matches query
None
4078
Group
Info
None
4082
Group
Warning
322
More Details
None
User Action
Events
ID
Topic
Level
Summary
More Details
4083
Group
Warning
4090
Group
Warning
4106
Group
Warning
4107
Group
Info
Replication integrity
check successful
None
4108
Group
Error
Replication integrity
issue detected
User Action
Detailed events
323
Events
ID
Topic
Level
Summary
More Details
User Action
4109
Group
Error
Replication integrity
check stopped before it
finished
4117
Group
Warning
4121
Group
Error
4123
Group
Error
4125
Group
Error
Journal capacity
insufficient
4126
Group
Error off
Journal capacity
sufficient
4127
Group
Warning
Predicted journal
capacity insufficient
4128
Group
Warning
off
Predicted journal
capacity sufficient
None
4131
Group
Warning
Transfer paused or
synchronizing for
unusually long time
None
4132
Group
Warning
off
Transfer resumed
4133
Group
Error
324
Events
ID
Topic
Level
Summary
More Details
User Action
Group
Error off
4139
Splitter
Warning
Storage unreachable
4158
Group
Warning
Journal capacity
extended
4163
Group
Error
Snap-based replication
has been disabled
4164
Group
Error off
Snap-based replication
has been restored
4165
Group
Error
4166
Group
Error
Replication integrity
check failed to run
Replication integrity check failed to Wait for the current integrity check
run because another integrity check to end, or stop the current process.
is already running on the same RPA.
4167
Group
Error
Replication integrity
check stopped before it
finished
4175
RPA
Info
No action required.
Detailed events
325
Events
ID
Topic
Level
Summary
More Details
User Action
4176
RPA
Cluster
Info
No action required.
4177
RPA
Cluster
Info
No action required.
4178
RPA
Info
No action required.
4179
RPA
Info
4180
RPA
Cluster
Info
No action required.
4181
RPA
Cluster
Info
No action required.
4182
RPA
Info
No action required.
4183
RPA
Info
No action required.
4184
RPA
Info
No action required.
4185
RPA
Cluster
Info
No action required.
4186
RPA
Cluster
Info
No action required.
4230
RPA
Cluster
Info
4231
RPA
Info
4232
RPA
Cluster
Info
4233
RPA
Cluster
Info
4311
Group
Info
Load balancing
recommendation
None
4501
Mgmt
Warning
License invalid in
RecoverPoint
326
Events
ID
Topic
Level
Summary
More Details
User Action
4502
Mgmt
Warning
License invalid in
RecoverPoint/SE
5008
Splitter
Warning
None
5010
Splitter
Warning
Splitter stopped
5011
Splitter
Info
Splitter stopped
5012
Splitter
Warning
Splitter stopped
5050
Splitter
Warning
None
Detailed events
327
Events
ID
Topic
Level
Summary
More Details
5051
Splitter
Warning
Unregistered array or
vCenter Server found
5054
Group
Warning
Consistency group is
configured with a LUN
greater than 2 TB and a
VNX/CLARiiON splitter
version that does not
support the LUN.
None
5055
Group
Warning
off
None
5056
Splitter
Warning
None
5057
Group
Warning
5058
Group
Warning
off
Volume configuration
Replication set volume
supported by VNX/
configuration is now supported by
CLARiiON splitter version the VNX/CLARiiON splitter version
installed on the system.
6000
Group
Error
Image cannot be
accessed
6001
Group
Error off
8000
Mgmt
Error
Calling home
None
8001
Mgmt
Error
None
328
User Action
No action required.
Events
ID
Topic
Level
Summary
More Details
8002
RPA
Cluster
Info
VM created
None
8003
RPA
Cluster
Info
8004
RPA
Cluster
Info
None
8005
RPA
Cluster
Info
None
8101
RPA
Cluster
Info
None
8102
RPA
Cluster
Info
Array provider
unregistered
None
8103
RPA
Cluster
Info
None
8104
RPA
Cluster
Info
Storage was
unregistered
None
8105
RPA
Cluster
Warning
Lost connectivity to
storage
None
8106
RPA
Cluster
Info
Restored connectivity to
storage
None
8107
RPA
Cluster
Info
None
8108
RPA
Cluster
Info
None
8200
Group
Info
None
8201
Group
Info
Snap-based replication
is done
None
8202
Group
Info
None
8203
Group
Error
None
8204
Group
Error
None
8205
Group
Error
9998
RPA
Info
None
10203
RPA
Error off
None
User Action
Detailed events
329
Events
ID
Topic
Level
Summary
More Details
10206
RPA
Brief
error
Internal process
restarted
None
10207
RPA
Brief
error
Internal process
restarted
None
10210
RPA
Error
10211
RPA
Error
SAN communication
problem between
splitters and RPAs
existed but has resolved
itself
None
10212
RPA
Error off
10213
RPA
Error off
10216
RPA
Brief
error
Internal process
restarted
None
10501
RPA
Info
Synchronization
complete
None
10502
RPA
Info
10503
RPA
Error
Transferring latest
snapshot
10504
RPA
Info
Access to image
disabled
10505
RPA
Info
None
10506
RPA
Info
10507
RPA
Info
330
User Action
Events
ID
Topic
Level
Summary
More Details
10508
RPA
Info
Data flushed from source All data has been flushed from the
RPA
source RPA. Failover will proceed.
10509
RPA
Info
10510
RPA
Info
Following a pause
None
transfer system now
cleared to restart transfer
10511
RPA
Info
Finished recovering
replication backlog
10512
RPA
Info
Following a pause
None
transfer system now
cleared to restart transfer
12000
RPA
Error
None
12001
RPA
Error
Splitter is down
None
12002
RPA
Error
None
12003
RPA
Error
None
12004
RPA
Error
Error in data link to other Error in data link. All RPAs at cluster
cluster(s)
are unable to transfer replicated
data to other cluster(s) due to
communication failure over the
WAN link. Data transfer between
RPA clusters has stopped.
User Action
None
None
Detailed events
331
Events
ID
Topic
Level
Summary
More Details
User Action
network configuration.
-
12005
RPA
Error
None
12006
RPA
Error
RPA is disconnected
from the RPA cluster
None
12007
RPA
Error
None
12008
RPA
Error
RPA is down
None
12009
RPA
Error
12010
RPA
Error
332
Events
ID
Topic
Level
Summary
More Details
User Action
12011
RPA
Error
12012
RPA
Error
None
12013
RPA
Error
12014
RPA
Error
12016
RPA
Error
12022
RPA
Error
12023
RPA
Error
Detailed events
333
Events
ID
Topic
Level
Summary
More Details
12024
RPA
Error
12025
RPA
Error
12026
RPA
Error
12027
RPA
Error
12029
RPA
Error
12030
RPA
Error
12031
RPA
Error
None
12032
RPA
Cluster
Error
None
12033
RPA
Error
12034
RPA
Error
None
12035
RPA
Error
12036
RPA
Error
Negotiation of transfer
protocol failed
12037
RPA
Error
334
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Error
12039
RPA
Warning
Long initialization
started
None
12040
RPA
Error
None
12041
RPA
Error
12043
RPA
Error
None
12044
RPA
Error
12045
RPA
Error
None
12046
RPA
Error
None
12047
RPA
Error
None
12048
RPA
Error
Unsupported splitter
version
None
12049
RPA
Info
None
12050
RPA
Error
RecoverPoint has
None
dynamically started
replicating
asynchronously to one of
the replicas of this
group. The group will
now be initialized.
During initialization data
is not transferred
synchronously
12051
RPA
Cluster
Error
VNX/CLARiiON storage
disaster
335
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Cluster
Error
Storage disaster
12053
RPA
Cluster
Error
VNX/CLARiiON storage
disaster with working
splitter
12054
RPA
Error
RPA to storage
connectivity failure
336
Events
ID
Topic
Level
Summary
More Details
User Action
server and confirm that the RPA is
logged-into the fabric. Run fibre
channel connectivity tests (through
the boxmgmt diagnostics menu) on
the RPA for which this error was
reported. Check the storage LUN
masking and mapping, and confirm
that the RPA is registered and
configured to access the storage. If
none of the above instructions
resolve this issue, collect system
information from the cluster
experiencing connectivity issues,
and contact EMC Customer Service.
12055
RPA
Error
RPA to VNX/CLARiiON
storage connectivity
failure
12056
RPA
Error
RPA to VNX/CLARiiON
storage/splitter
connectivity failure
337
Events
ID
Topic
Level
Summary
More Details
User Action
server and confirm that the RPA is
logged-into the fabric. Run fibre
channel connectivity tests (through
the boxmgmt diagnostics menu) on
the RPA for which this error was
reported. If none of the above
instructions resolve this issue,
collect system information from the
cluster experiencing connectivity
issues, and contact EMC Customer
Service.
12057
RPA
Cluster
Info
Replication volume
reservation conflict
12058
RPA
Error
RPA to splitter
communication error
None
12059
RPA
Error
RPA communication
problem with volumes
12060
RPA
Error
RPA communication
problem with journal
volumes
None
12061
RPA
Error
RPA communication
problem with replication
volumes
None
12062
RPA
Error
RPA communication
problem with replication
volume
None
12063
RPA
Error
RPA communication
problem with journal
volume
None
12070
RPA
Error
12071
RPA
Error
12072
RPA
Error
12073
RPA
Error
RPA communication
None
problems with repository
volume
12074
RPA
Error
None
12075
RPA
Cluster
Error
None
338
Events
ID
Topic
Level
Summary
More Details
User Action
12076
RPA
Cluster
Error
None
12077
RPA
Cluster
Error
None
12078
RPA
Error
Splitter communication
error
12079
RPA
Error
VNX/CLARiiON splitter
communication error
12080
RPA
Error
Communications
problem in internal
process
339
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Error
Communications
problem in internal
process
12082
RPA
Error off
Communications
problem in internal
process
12083
RPA
Error
Communications with
Communications with Symmetrix
Symmetrix director failed director has failed repeatedly.
12085
Mgmt
Info
User logged in
None
12086
RPA
Warning
None
12087
RPA
Warning
None
14001
RPA
Error off
14002
RPA
Error off
None
14003
RPA
Error off
None
14004
RPA
Error off
None
14005
RPA
Error off
None
340
Events
ID
Topic
Level
Summary
More Details
14006
RPA
Error off
None
14007
RPA
Error off
14008
RPA
Error off
RPA is up
None
14009
RPA
Error off
14010
RPA
Error off
None
14011
RPA
Error off
None
14012
RPA
Error off
None
14013
RPA
Error off
No longer trying to
access a diluted image
None
User Action
Detailed events
341
Events
ID
Topic
Level
Summary
More Details
14014
RPA
Error off
14016
RPA
Error off
14022
RPA
Error off
14023
RPA
Error off
14024
RPA
Error off
14025
RPA
Error off
14026
RPA
Error off
14027
RPA
Error off
14029
RPA
Error off
14030
RPA
Error off
14031
RPA
Error off
14032
RPA
Cluster
Error off
None
14033
RPA
Error off
Access to volume
restored
14034
RPA
Error off
Replication consistency
to storage restored
14035
RPA
Error off
342
User Action
Events
ID
Topic
Level
Summary
More Details
14036
RPA
Error off
Negotiation of transfer
protocol successful
again
14037
RPA
Error off
None
14038
RPA
Error off
None
14039
RPA
Warning
off
Long initialization
completed
None
14040
RPA
Error off
None
14041
RPA
Error off
None
14042
RPA
Error off
Synchronization in
progress to restore any
failed writes in group
None
14043
RPA
Error off
Synchronization in
progress to restore any
failed writes
None
14044
RPA
Error off
14045
RPA
Error off
14046
RPA
Error off
None
14047
RPA
Error off
None
14049
RPA
Info
RPA is out of
maintenance mode
None
14050
RPA
Error off
RecoverPoint has
None
dynamically resumed
synchronous replication
to one of the replicas of
this group. The group will
now be initialized.
User Action
Detailed events
343
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Cluster
Error off
End of VNX/CLARiiON
storage disaster
14052
RPA
Cluster
Error off
14053
RPA
Cluster
Error off
End of VNX/CLARiiON
storage disaster with
working splitter
14054
RPA
Error off
14055
RPA
Error off
14056
RPA
Error off
14057
RPA
Cluster
Info
Group volumes
reservation conflicts
were fixed
None
14058
RPA
Error off
None
14059
RPA
Error off
End of connectivity
problems between all
group volumes and RPA
None
14060
RPA
Error off
End of connectivity
None
problems between group
journal volumes and RPA
14061
RPA
Error off
End of connectivity
None
problems between group
344
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Error off
End of connectivity
None
problems between group
replication volume and
RPA
14063
RPA
Error off
Connectivity problems
with group journal
volume and RPA were
fixed
14070
RPA
Error off
14071
RPA
Error off
14072
RPA
Error off
14073
RPA
Error off
Connectivity between
repository volume and
RPA restored
None
14074
RPA
Error off
None
14075
RPA
Cluster
Error off
None
14076
RPA
Cluster
Error off
None
14077
RPA
Cluster
Error off
None
14078
RPA
Error off
End of splitter
communication error
14079
RPA
Error off
End of VNX/CLARiiON
splitter communication
error
None
Detailed events
345
Events
ID
Topic
Level
Summary
More Details
the splitter, transfer will not be
paused and initialization or full
sweep will not be necessary.
14080
RPA
Error off
Fix of communications
problem in internal
process
None
14081
RPA
Error off
Internal process
communication problem
has been fixed
None
14082
RPA
Error off
Fix of communications
problem in internal
process
None
14083
RPA
Error off
Communication with
Symmetrix director
restored
14086
RPA
Warning
off
None
14087
RPA
Warning
off
None
16000
RPA
Brief
error
None
16001
RPA
Brief
error
16002
RPA
Brief
error
16003
RPA
Brief
error
16004
RPA
Brief
error
Brief error in data link to Error in data link. All RPAs at cluster
other cluster(s) corrected are unable to transfer replicated
data to other cluster(s). Problem
has been corrected.
16005
RPA
Brief
error
None
16006
RPA
Brief
error
None
346
User Action
Events
ID
Topic
Level
Summary
More Details
16007
RPA
Brief
error
16008
RPA
Brief
error
16009
RPA
Brief
error
Link was in high load but Due to heavy I/O activity, a link
has now returned to
entered a high load state in order to
normal operation
prevent I/O failures on that link.
The link has since exited the high
load state, and has returned to
normal operation. The following are
among the possible causes of the
high load: RPA is unable to handle
the large volume of incoming data.
(RPA performance statistics are
presented in the Release Notes that
accompany each RecoverPoint
product release.) Journal reaches
capacity, because the rate of the
distribution process consistently
lags behind the rate of incoming
data to the copy journal. WAN is too
slow to handle the data rate.
Compression for WAN optimization
is too high, such that the RPA is
unable to handle the volume of
incoming data. Peak I/O activity in
the SAN causes a temporary
bottleneck in the environment. This
can be considered normal behavior,
and does not necessarily require
user action.
16010
RPA
Brief
error
None
16011
RPA
Brief
error
16012
RPA
Brief
error
16013
RPA
Brief
error
None
User Action
None
If high load persists, consider
running the balance_load
command and applying the load
balancing recommendation, or
manually modifying the preferred
RPA of each group according to the
recommendation. Check for
scheduled activities in your
environment. When schedule
permits, run
detect_bottlenecks for the
consistency group in which the high
load condition was detected. If
relevant, consider enabling fast
first-time initialization (for details,
see RecoverPoint Administrators
Guide).
Detailed events
347
Events
ID
Topic
Level
Summary
More Details
16014
RPA
Brief
error
16016
RPA
Brief
error
16022
RPA
Brief
error
16023
RPA
Brief
error
None
16024
RPA
Brief
error
16025
RPA
Brief
error
16026
RPA
Brief
error
16027
RPA
Brief
error
16029
RPA
Brief
error
16030
RPA
Brief
error
16031
RPA
Brief
error
16032
RPA
Cluster
Brief
error
16033
RPA
Brief
error
Brief volume
accessibility error
corrected
348
User Action
Events
ID
Topic
Level
Summary
More Details
16034
RPA
Brief
error
16035
RPA
Brief
error
16036
RPA
Brief
error
Negotiation of transfer
protocol successful
again
16037
RPA
Brief
error
16038
RPA
Brief
error
16039
RPA
Info
None
16040
RPA
Brief
error
None
16041
RPA
Brief
error
None
16042
RPA
Brief
error
None
16043
RPA
Brief
error
None
16044
RPA
Brief
error
None
16045
RPA
Brief
error
None
User Action
Detailed events
349
Events
ID
Topic
Level
Summary
More Details
16046
RPA
Brief
error
None
16047
RPA
Brief
error
16048
RPA
Brief
error
Brief unsupported
splitter version error
corrected
16049
RPA
Info
None
16050
RPA
Error
RecoverPoint had
dynamically resumed
synchronous replication
to one of the replicas of
this group but has since
started replicating
asynchronously again.
Consequentially the
group has been
initialized twice. During
initialization data was
not transferred
synchronously. If this is
not the expected
behavior contact EMC
Customer Support
None
16051
RPA
Cluster
Brief
error
16052
RPA
Cluster
Brief
error
350
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
16053
RPA
Cluster
Brief
error
16054
RPA
Brief
error
16055
RPA
Brief
error
16056
RPA
Brief
error
16057
RPA
Cluster
Info
Brief reservation
conflicts on group
volumes
None
16058
RPA
Brief
error
Brief connectivity
None
problem between splitter
and RPA
16059
RPA
Brief
error
Brief connectivity
problem between all
group volumes and RPA
16060
RPA
Brief
error
Brief connectivity
None
problem between group
journal volumes and RPA
16061
RPA
Brief
error
Brief connectivity
problem between group
replication volumes and
RPA
None
16062
RPA
Brief
error
Brief connectivity
problem between group
replication volume and
RPA
None
16063
RPA
Brief
error
Brief connectivity
problem between group
journal volume and RPA
None
16070
RPA
Brief
error
None
Detailed events
351
Events
ID
Topic
Level
Summary
16071
RPA
Brief
error
16072
RPA
Brief
error
16073
RPA
Brief
error
Brief connectivity
problem between
repository volume and
RPA
None
16074
RPA
Brief
error
None
16075
RPA
Cluster
Brief
error
None
16076
RPA
Cluster
Brief
error
None
16077
RPA
Cluster
Brief
error
None
16078
RPA
Brief
error
Brief splitter
communication error
16079
RPA
Brief
error
Brief VNX/CLARiiON
splitter communication
error
16080
RPA
Brief
error
Internal process
communication problem
352
More Details
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
16081
RPA
Brief
error
Internal process
communication problem
16082
RPA
Brief
error
Internal process
communication problem
briefly resolved
16083
RPA
Brief
error
Communications with
Symmetrix director
restored again
16086
RPA
Warning
off
None
16087
RPA
Warning
off
None
18001
RPA
Error
None
18002
RPA
Error
18003
RPA
Error
None
18004
RPA
Error
18005
RPA
Error
18006
RPA
Error
None
Detailed events
353
Events
ID
Topic
Level
Summary
More Details
18007
RPA
Error
None
18008
RPA
Error
None
18009
RPA
Error
18010
RPA
Error
18011
RPA
Error
18012
RPA
Error
None
18013
RPA
Error
None
18014
RPA
Error
18016
RPA
Error
18022
RPA
Error
18023
RPA
Error
354
User Action
Events
ID
Topic
Level
Summary
More Details
18024
RPA
Error
18025
RPA
Error
18026
RPA
Error
None
18027
RPA
Error
18029
RPA
Error
18030
RPA
Error
18031
RPA
Error
None
18032
RPA
Cluster
Error
None
18033
RPA
Error
None
18034
RPA
Error
Replication consistency
in writes to storage and
writes to RPAs was
temporarily restored but
None
User Action
Detailed events
355
Events
ID
Topic
Level
Summary
More Details
RPA
Error
18037
RPA
Error
18038
RPA
Error
18039
RPA
Warning
None
18040
RPA
Error
None
18041
RPA
Error
Problem writing to
volume was corrected,
but has recurred
None
18042
RPA
Error
Synchronization had
None
restored any failed writes
in group but problem has
returned
18043
RPA
Error
Internal problem
18044
RPA
Error
18045
RPA
Error
18046
RPA
Error
356
None
None
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Error
None
18049
RPA
Info
None
18050
RPA
Error off
RecoverPoint had
dynamically resumed
synchronous replication
to one of the replicas of
this group but has since
started replicating
asynchronously again.
Consequentially the
group has been
initialized twice. During
initialization data was
not transferred
synchronously. If this is
not the expected
behavior contact EMC
Customer Support
None
18051
RPA
Cluster
Error
Recurring VNX/CLARiiON
storage disaster
None
18052
RPA
Error
Recurring storage
disaster
None
18053
RPA
Error
Recurring VNX/CLARiiON
storage disaster with
working splitter
None
18054
RPA
Error
None
18055
RPA
Error
None
18056
RPA
Error
None
18057
RPA
Cluster
Info
Reservation conflicts
from group replication
volumes were briefly
fixed
None
Detailed events
357
Events
ID
Topic
Level
Summary
More Details
18058
RPA
Error
Splitter to RPA
connectivity error has
returned
None
18059
RPA
Error
Connectivity problems
between all group
volumes and RPA were
briefly corrected
None
18060
RPA
Error
Connectivity problems
between group journal
volumes and RPA were
briefly corrected
None
18061
RPA
Error
Connectivity problems
between group user
volumes and RPA were
briefly corrected
None
18062
RPA
Error
Connectivity problems
between group user
volume and RPA were
briefly corrected
None
18063
RPA
Error
Connectivity problems
between group journal
volume and RPA were
briefly corrected
None
18070
RPA
Error off
18071
RPA
Error off
18072
RPA
Error off
18073
RPA
Error
Connectivity between
repository volume and
RPA restored
None
18074
RPA
Error
18075
RPA
Cluster
Error
None
358
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
18076
RPA
Cluster
Error
None
18077
RPA
Cluster
Error
None
18078
RPA
Error
Splitter communication
error returned
18079
RPA
Error
VNX/CLARiiON splitter
communication error
returned
18080
RPA
Error
Internal process
communication problem
18081
RPA
Error
Internal process
communication problem
18082
RPA
Error
Internal process
communication problem
18083
RPA
Error
Communication with
After a brief recovery,
Symmetrix director failed communications with a Symmetrix
again
director has failed again.
18086
RPA
Brief
warning
Detailed events
359
Events
ID
Topic
Level
Summary
More Details
18087
RPA
Brief
warning
None
User Action
Advanced events
The following table contains the Normal scope events that are issued by the RecoverPoint
system.
Table 71 Advanced scope events
ID
Topic
Level
Summary
More Details
2004
RPA
Cluster
Info
Repository volume
created
None
2005
RPA
Cluster
Info
Repository volume
removed
None
2006
RPA
Cluster
Info
Splitter(s) added
None
2007
RPA
Cluster
Info
Splitter(s) removed
None
3003
RPA
Warning
Stopping a system
process
None
3004
RPA
Info
Starting a system
process
None
3009
RPA
Warning
A system process
stopped
None
3010
RPA
Warning
A system process
stopped
None
3031
RPA
Warning
An internal process
restarted
None
3032
RPA
Info
An internal process
restarted
None
3034
RPA
Info
Negotiating transfer
protocol
None
3035
RPA
Info
An internal process
restarted
None
4005
Group
Info
Negotiating transfer
protocol
None
4013
RPA
Info
Negotiating transfer
protocol
None
4013
RPA
Info
Negotiating transfer
protocol
None
360
User Action
Events
ID
Topic
Level
Summary
More Details
4014
Group
Info
Negotiating transfer
protocol
None
4050
Group
Info
4052
Group
Warning
4072
Group
Info
Journal cleared
None
4073
Group
Warning
Journal cleared
None
4074
Group
Error
Journal cleared
None
4075
Group
Info
Journal available
None
4076
Group
Info
Adding volume(s)
None
4077
Group
Info
Removing volume(s)
None
4092
Group
Info
Accessing image
4093
Group
Info
None
4094
Group
Info
None
4096
Group
Info
None
4100
RPA
Cluster
Info
Group created
4101
RPA
Cluster
Info
Group removed
None
4102
Group
Info
Journal volume(s)
removed
None
4103
Group
Info
None
4104
Group
Info
None
4105
Group
Info
5000
Splitter
Info
Volume(s) attached to
splitter(s)
5001
Splitter
Info
5049
Splitter
Warning
None
10000
RPA
Info
Analyzing changes in
system
None
User Action
None
Advanced events
361
Events
ID
Topic
Level
Summary
More Details
10001
RPA
Info
System is stable
10002
RPA
Info
Issuing intermediate
report
10101
RPA
Error
Unrecognised system
activity
10102
RPA
Info
Internal changes
occurred
10201
RPA
Info
None
10202
RPA
Info
12042
RPA
Error
362
User Action