HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

124 of 739
Requirement Configuration
System path
The source and the target must have the same system path. The
system path includes the location of the Windows files, Program Files,
and Documents and Settings.
Storage
Mirroring
Recover path
Storage Mirroring Recover must be installed on the system path on the
source and the target.
Storage
Mirroring
Recover data
state
The source should be from a time when the Storage Mirroring Recover
data state is good. If you are using snapshots, you may want to use a
snapshot from the last good data state.
Capacity and
free space
The target must have enough space to store the data from the source.
This amount of disk space will depend on the applications and data
files you are protecting. The more data you are protecting, the more
disk space you will need. You must also have enough space on the
target to process and apply the system state data.
Storage Mirroring Recover performs several validation checks to
determine if adequate disk space is available. First, the target must
have enough free space on its system volume to hold the entire
volume(s) (free and used) from the source. If this first validation check
passes, then no additional checks are necessary. Otherwise, there
must be at least enough free space on the target system volume to
store the system path (including the location of the Windows files,
Program Files, and Documents and Settings) from the source. If this
second validation check passes, then no additional checks are
necessary. If this second validation fails, Storage Mirroring Recover
will check to see if a previous failover may have been attempted.
Since Storage Mirroring Recover can reuse the disk space from a
previous failover attempt, it will add the size of that data to the amount
of free space available. If that is enough space for the failover, the
failover will continue. If not, you will either have to select a different
target or delete files on the target to free disk space.
Establishing full-server protection
Use the following instructions to establish protection for your entire source.