HP StorageWorks Storage Mirroring Recover User's Guide (T5437-96008, November 2009)

731 of 739
Note:
You can minimize the Failover Control Center and, although it will not appear in
your Windows taskbar, it will still be active and the failover icon will still appear
in the desktop icon tray.
The Failover Control Center does not have to be running for failover to occur.
Monitoring failover monitoring contains more information on the Failover Control Center
visual indicators.
8. Simulating a failure
To fully evaluate failover, you need to simulate a failure. The Failover Control Center
does not have to be running in order for failover to occur, but for the purpose of this
evaluation, make sure that it is running so that you can see each step of the process.
1. Ping the source’s IP address from a client machine.
2. Ping the source’s machine name from a client machine.
3. Disconnect the network cable(s) on the source. Notice immediately, that the
Failover Control Center Time to Fail counter decreases and never resets. You will
see the icons change to yellow and eventually to red. Once the icons are red and
the Failed Over message is displayed, failover has occurred.
4. You will be prompted to determine how to apply the data in queue on the target.
Select Apply Data in Target Queues Then Failover. Once the icons are red and
the Failed Over message is displayed, failover has occurred.
Note:
The Event log on the target provides details on the actual steps that have
occurred during failover.
5. Ping the source’s IP address from a client machine.
6. Ping the source’s machine name from a client machine.
As you can see, the target has taken on the identity of the source. Application and user
requests destined for the source are routed directly to the target. The impact on your end
users is minimal.
9. Simulating data changes after failover
While your source is failed over to your target, end users continue to work without
interruption and the data on the target will be updated. To fully evaluate the next step,
restoration, simulate the changes that the end users would have made on the target
while the source was unavailable.
1. Identify the file that you edited earlier on the source.
2. Locate that same file on the target and make edits to it. Save the changes.