HP P9000 Replication Manager Software 7.2 User Guide

Pair configurations subwindow ............................................................................................. 49
Pair configurations subwindow ............................................................................................. 50
Structure of the Pair Configurations view ................................................................................ 50
Applications subwindow ..................................................................................................... 51
Applications subwindow ..................................................................................................... 52
Structure of the Applications view ......................................................................................... 52
4 Setting up information sources ........................................................... 55
About information sources .......................................................................................................... 55
Registering information sources ................................................................................................... 55
Registering information sources workflow ............................................................................... 56
Adding a Device Manager server ......................................................................................... 57
Adding an instance of HP StorageWorks P9000 for Business Continuity Manager Software or
P9000 mainframe agent ..................................................................................................... 58
When multiple BCM instances have overlapping configuration definition files ............................. 59
Restrictions when Replication Manager and HP StorageWorks P9000 for Business Continuity
Manager Software versions differ ......................................................................................... 59
Setting up Application Agent ...................................................................................................... 60
About application discovery ................................................................................................ 61
Adding an instance of Application Agent .............................................................................. 61
Setting Application Agent options ........................................................................................ 62
Settings for virtual hosts and cluster configurations ............................................................ 64
About concealing/revealing replica volumes ......................................................................... 64
Parallel verification count and number of backup servers ......................................................... 66
About VDI generation timeout .............................................................................................. 68
Refreshing Application Agent ............................................................................................... 68
5 Discovering volumes ........................................................................ 71
Discovering volumes (open systems) ............................................................................................ 71
Discovering volumes (mainframe) ................................................................................................ 71
About mainframe volume discovery ...................................................................................... 71
Volume scan ...................................................................................................................... 72
About volume scans ..................................................................................................... 72
Example volume scan procedure ................................................................................... 73
Types of volume scans .................................................................................................. 73
Setting volume ranges for volume scan ........................................................................... 73
Adding a volume range to a volume range list ................................................................. 74
Restrictions for adding volume ranges for volume scans ..................................................... 74
Deleting a volume range from a volume range list ............................................................ 75
Restrictions for deleting volume ranges ............................................................................ 75
Performing a volume scan ................................................................................................... 75
Distributing and managing disk configurations ....................................................................... 76
About distributing disk configurations ............................................................................. 76
Example disk list distribution scenario ............................................................................. 77
Prerequisites for distribution destination hosts (disk configuration definitions) ........................ 77
Conditions affecting displayed disk list information ........................................................... 77
Selecting targets for disk configuration distribution ........................................................... 78
Displaying disk configuration definition files .................................................................... 79
Editing disk configuration definition files ......................................................................... 79
Reviewing mainframe volumes .............................................................................................. 80
Reviewing paired DEVN list ........................................................................................... 80
Reviewing paired LDEV list ............................................................................................ 81
Reviewing unpaired DEVN list ....................................................................................... 81
Reviewing unpaired LDEV list ......................................................................................... 82
4