![]() |
![]() |
![]() |
![]() |
![]() |
The Create Replicated Data Set wizard guides you through the process of setting up replication using automatic synchronization.
To set up replication using the Create Replicated Data Set wizard
Click the thumbnail above to view full-sized image.
After you have provided the required information, click Next.
After you have provided the required information, click Next.
hr_srl, and then click Next. If you selected Include VxVM ISP Volumes Only, the list displays VxVM ISP volumes only.
If the operation fails, a failure message lists the possible reasons of failure in the Result Details area. Read the details carefully and take appropriate corrective action. For more information about the error, note down the Unique Message Identifier (UMI) that is displayed with the error message, and then refer the Veritas Technical Services knowledge base.
Note
UMI is a string of the format "V-xx-yy-zz". For example, V-38-1-11 is the UMI displayed when an invalid Secondary host name is entered.
Click the thumbnail above to view full-sized image.
If the name of the Secondary disk group is other than the default, enter the correct Secondary disk group name. This disk group must contain the SRL and data volumes that are to be associated with the Secondary RVG that is being created.
Enter the new Primary RLINK name if the default name is not appropriate.
Enter the new Secondary RLINK name if the default name is not appropriate.
Asynchronous is selected by default. Select the required mode of replication. To enable synchronous mode, select Synchronous-Override. To set the replication mode to
synchronous=fail
, use the command-line interface. For more information, refer to Administering Veritas Volume Replicator.By default, SRL protection is set to AutoDCM. Select the required value to change the SRL protection mode. To enable SRL protection, select AutoDCM, DCM, or Override. To disable SRL protection, select Off. If you disable SRL protection, the SRL is allowed to overflow. To set the SRL protection mode to fail, use the command-line interface (CLI). For details on using the CLI, refer to Administering Veritas Volume Replicator.
If you are changing the replication settings for a bunker Secondary, AutoDCM or DCM are not available because a bunker does not contain data volumes, and therefore cannot use a DCM to track changes in the case of SRL overflow.
By default, latency protection is set to Off. To enable latency protection and limit the number of updates by which the Secondary is allowed to fall behind, select Override. If you select Override, the wizard displays the boxes Latency Low Mark and Latency High Mark with default values of 9950 and 10000 respectively.
To disable latency protection, select Off.
To set the latency protection to fail, use the command-line interface (CLI). For details on using the CLI, refer to Administering Veritas Volume Replicator.
Displays only if Latency Protection is set to Override. The default is 10000. Enter the required numerical limit.
Displays only if Latency Protection is set to Override. The default is 9950. Enter the required numerical limit.
Indicates the network connectivity between the Secondary and the Primary. UDP is selected by default.
If you are changing the replication settings for the bunker Secondary, you can select STORAGE, in addition to UDP or TCP.
If the bunker is replicating over IP, the protocol can be set to UDP or TCP. If the storage is directly accessible by the Primary, for example, DAS or NAS, set the protocol to STORAGE.
To control the network bandwidth to be used by VVR for replication, click the Set Bandwidth Limit check box; then specify the bandwidth limit. Note that the specified bandwidth limit must be greater than 56 kilo bits per second (kbps).
To disable Bandwidth Throttling, clear the Set Bandwidth Limit check box. This sets the bandwidth limit to none. By default, Bandwidth Throttling is disabled.
If the operation fails, the page displays the failure message and lists the possible reasons of failure in the Result Details area. Read the details carefully and take appropriate corrective action. For more information about the error, note down the Unique Message Identifier (UMI) that is displayed with the error message, and then refer the Veritas Technical Services knowledge base.