HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

557 of 739
11. Select Tools, Restoration Manager.
12. Complete the appropriate fields on the Restoration Manager.
Original Source—The source where the data originally resided.
Restore From—The target that contains the replicated data that users have
been updating.
Replication Set—The name of the replication set.
Restore To—The source where the data will be restored to.
13. Disable Only if backup copy is more recent. This option must be disabled
because if the services were stopped on the source after the time they were
stopped on the target, the source files will have a more recent date and time and
the target files will not be restored.
14. Identify the correct drive mappings for the data and any other restoration options
necessary.
15. On the Orphans tab, select to move or delete orphan files on the source.
Orphan files, such as out-dated transaction logs, may keep the database from
starting on the source.
16. Verify that the selections you have made are correct and click Restore. The
restoration procedure time will vary depending on the amount of data that you have
to restore.
When the restoration process is complete, the restoration status information will no
longer appear in the right pane.
17. If you are performing a failback for an Exchange server, continue with Rehoming
the Exchange objects to the source to complete the restoration process.
18. Continue to Re-enabling protection to complete the restoration process.
Rehoming the Exchange objects to the source
After the restoration is complete, you will need to run the Exchange Failover utility
(exchfailover.exe) to rehome the informational store databases to the source. For more
information about using the Exchange Failover utility, see Using the Exchange Failover
(EFO) Utility.
1. From a command prompt on the source, run the post_restore_<source server
name>_<target server name>.bat file that Application Manager automatically
generated.
2. Restart any Outlook clients so that they can access the source.
To re-establish protection of the Exchange data on the source, create a replication set,
re-establish the Storge Mirroring connection to the target, and begin failure monitoring as
documented earlier in the procedure.