HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

727 of 739
Just like when you were monitoring the mirror and replication processes, you can
monitor the verification process. Notice that the Mirror Status column changes to
Verifying while the verification process occurs. When the verification is complete,
Storage Mirroring Recover will have created a log file for you to review.
5. Wait until your Mirror Status has returned to Idle and then open the file
DTVerify.log located in the Storage Mirroring Recover installation directory on your
source. You will see that all of the files are reported as the same.
6. Modify one of your files on the target and repeat the verification process, but this
time, select Remirror files to the Target automatically.
Note:
Since your target file is newer, make sure that Only if Source file is
newer than Target copy is not selected.
7. Look at the file on the target that you modified and confirm that your changes are
gone. The source version has overwritten the file on the target.
5. Testing your target data
At this point in your evaluation, you may want to test your target data. The type of testing
you will need to perform will depend on the type of data you are protecting.
User data—If you are protecting user files, you can use the associated application
to open the files on the target. Open one or more of the files to test the integrity of
the data. Do not save the file after you have opened it, because that will update the
copy of the data on the target, which you do not want to do at this point in the
evaluation.