HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

208 of 739
service, which replies immediately to confirm it is running. This method is
useful when ICMP is blocked on routers between the source and target.
Application Monitoring—If you select the Application Monitoring option,
the fields in Application Monitoring Settings area will be enabled.
Note:
In order to use Application Monitoring, the monitored servers must be running
Storage Mirroring Recover version 5.2 or later.
4. Configure how long to wait after a source failure to initiate failover. The amount of
time before failover begins is calculated by multiplying the Monitor Interval by the
Failure Count. For example, if the Monitor Interval is set to 5 seconds and the
Failure Count setting is 5, a failover condition will be identified after 25 seconds of
missed source activity.
a. In the Monitor Interval field, select how often the monitor should check the
source machine availability (Default = 5 seconds, or 60 seconds if
Application Monitoring is selected).
b. In the Failure Count field, select how many monitor replies can be missed
before assuming the source machine has failed (Default = 5 missed replies,
or 3 replies if Application Monitoring is selected).
5. If you are monitoring multiple IP addresses, select one of the Failover Trigger
options.
All Monitored IP Addresses Fail—Failover begins when all monitored IP
addresses fail.
One Monitored IP Address Fails—Failover begins when any of the
monitored IP addresses fail.
6. If you selected Application Monitoring as the Method to Monitor for Failover,
enter information in the Application Monitoring Settings area.
a. In the Username field, enter the fully-qualified user name that will be used to
run WMI scripts. The fully-qualified user name must be in the format
domain\username or username@domain.
Note:
The required credentials for running WMI scripts is full WMI access
to the CIMV2 namespace. Under Windows 2008, the supplied
credentials must also be allowed through DCOM and User Access
Control. It is recommended that a group be created for running
scripts, and that the required permissions be given to the group.
By default, the administrative group of a Windows 2008 machine
has full WMI access. However, DCOM and User Access Control
settings may need to be adjusted.
For more information, see Application Manager Credentials.