3.2 Protecting a Workload

This section explains how to typically protect workloads.

3.2.1 Creating a Protection Tier

If you are going to use one of the built-in Protection Tiers, or if you have created the necessary Protection Tier in the past, this step can be skipped. Protection Tiers determine when and how often a protected workload’s replication runs.

To create a Protection tier:

  1. On the Settings page, click Create Protection Tier.

    The Create Protection Tier page is displayed.

  2. In the Name field, type the name you want to use for the tier .

  3. In the Workload Failure field, specify the number of times Forge should try to detect the workload before giving up .

  4. In the Workload Detection Every field, specify the time intervals (in seconds) that Forge should use between detection attempts.

    For example, entering 60 means Forge attempts every 60 seconds to detect if the workload has gone offline . The value in the Workload Failure field indicates how many missed Workload Detection attempts occur before Forge sends out a Workload Offline notification.

  5. In the Recovery Points To Keep field, specify the number of recovery points to keep for workloads that use this Protection Tier.

    Entering 0 disables this feature. There is a limit of 32 recovery points that can be kept, but if there are many protected workloads on the Forge appliance and they are all keeping the maximum number of recovery points, storage space can become an issue.

    Reducing the Recovery Points to Keep value when there are multiple existing recovery points already stored can result in a lengthy merge procedure.

  6. In the Incremental Recurrence section, specify how often you want to run an incremental replication.

    Specify the date to start using the incremental recurrence, as well as the incremental recurrence pattern. You can type directly in the Start of recurrence field, or click the calendar icon to graphically select a date. You can also select None as the Recurrence Pattern to never use incremental replication.

    Depending on which recurrence pattern you select, different accompanying fields are displayed.

  7. Specify how often you want to run a full replication in the Full Recurrence section.

    Specify the date to start using the full recurrence, as well as the full recurrence pattern. You can type directly in the Start of recurrence field, or click the calendar icon to graphically select a date. You can also select None as the Recurrence Pattern to never use full replication.

    Depending on which recurrence pattern you select, different accompanying fields are displayed.

  8. Click Save.

    The Protection Tier list is displayed again, now showing your new Protection Tier in the list.

    To edit an existing Protection Tier, click its name in the list. To delete an existing Protection Tier, click delete next to the Protection Tier you want to delete. If a Protection Tier assigned to a protected workload is deleted, the settings are retained in the workload, but the Protection Tier is set to Custom. The built-in Protection Tiers (Hourly, Nightly, and Weekly) can neither be edited nor deleted.

    If a workload’s incremental and full recurrences coincide, the full recurrence takes precedence.

For more information on Protection Tiers, see Protection Tiers.

3.2.2 Network Communication Prerequisites for Discovery

The following are software, network, and firewall requirements that systems in your environment must meet for the discovery process. For a full list of required ports, see Table 7-1.

Table 3-1 Network Communication Prerequisites for Discovery Operations

System

Prerequisites

Microsoft* Windows* Server 2008 and Windows Vista* sources

  1. Built-in Administrator or domain admin account credentials (mere membership in the local Administrators group is insufficient). On Vista, the account must be enabled (it is disabled by default).

  2. The Remote Registry service enabled (disabled on Vista by default).

  3. Firewall configured with these Inbound Rules enabled and set to Allow:

    • File and Printer Sharing (Echo Request - ICMPv4In)

    • File and Printer Sharing (Echo Request - ICMPv6In)

    • File and Printer Sharing (NB-Datagram-In)

    • File and Printer Sharing (NB-Name-In)

    • File and Printer Sharing (NB-Session-In)

    • File and Printer Sharing (SMB-In)

    • File and Printer Sharing (Spooler Service - RPC)

    • File and Printer Sharing (Spooler Service - RPC-EPMAP)

    NOTE:The firewall settings above are configured using the Windows Firewall with Advanced Security utility (wf.msc). You can achieve the same result by using the basic Windows Firewall utility (firewall.cpl): select the File and Printer Sharing item in the list of exceptions.

All supported Windows sources prior to Windows Server 2008 and Windows Vista

  • Windows Management Instrumentation (WMI) installed

  • Open ports 135/445 (TCP) for DCOM/RPC

Windows NT* Server does not include WMI as part of the default installation. Obtain the WMI Core from the Microsoft Web site. If WMI is not installed, discovery of the workload fails.

WMI (RPC/DCOM) can use TCP ports 135 and 445 as well as random or dynamically assigned ports above 1024. If problems occur during the discovery process, consider temporarily placing the workload in a DMZ or temporarily opening the firewalled ports for the discovery process only.

For additional information, such as guidance in limiting the port range for DCOM and RPC, see the following Microsoft technical articles.

3.2.3 Adding a Workload

Before a workload can have protection applied to it, PlateSpin Forge needs to add or discover it by using details you enter.

  1. Click Add Workload on the Dashboard page or on the Workloads page.

    The Add Workload page is displayed.

  2. In the Hostname or IP field, specify the IP address or hostname of the workload to be protected .

  3. In the Domain\Username and Password fields, specify the credentials for the workload.

    The username must have Administrative privileges on the workload being added.

  4. Select a replication method.

    • Select Full Replication and click Add for workloads that will use a full replication to Forge.

    • Select Incremental Replication to add a workload that already exists on Forge (for example, a contract that needs to be re-established after a failover) or that has been previously imported to Forge. Select the existing/imported workload from the drop-down list and select the desired network options. Click Add.

    PlateSpin Forge attempts to discover the workload using the details you entered.

    The Block-level transfer method is not supported for incremental workload synchronizations.

    For more information on adding a workload imported to Forge, see Section 3.5, Importing a Workload into Forge.

When the workload is added (discovery is successful), it appears in the Workload list on the Workloads page with a Replication Status of Unprotected.

3.2.4 Configuring Protection and Preparing Replication

When a workload has been added to PlateSpin Forge, it needs to have its protection configured before any replications can be run.

  1. On the Workloads page, click the name of the workload for which you want to configure protection.

    The Workload Details page is displayed.

  2. Select a Protection Tier from the Protection Tier drop-down box.

    The parameters in the Protection Tier section are set to the values in the selected Protection Tier and are read-only. You can also select Custom as the Protection Tier so all the fields are editable.

  3. Select a transfer method.

    For more information on transfer methods, see Supported Transfer Methods.

  4. Select a Recovery Point Datastore. This is the location where the recovery point file will be stored.

  5. Deselect any detected volumes that you do not want protected.

  6. Specify any services you want stopped during replication.

  7. In the VM Memory field, set the recovery workload memory allocation . The default value is the size of the protected workload memory size.

  8. Specify the hostname and domain/workgroup and any necessary credentials. The default values are those set in the protected workload.

  9. In the Guest NIC section, specify the network to use for the recovery workload during failover .

  10. If desired, change the run state of any Windows services in the Target Services section.

  11. Select the network the recovery workload should use by clicking the Temporary Failover Network drop-down.

  12. Click Save & Prepare.

  13. Click Execute.

    When the workload is prepared (the recovery workload virtual machine is created and ready to receive data), its entry in the Workload list on the Workloads page displays a Replication Status of Replication Prepared.

3.2.5 Running Replication

Before a workload is protected, a replication needs to be run so the replication workload is synchronized with it.

  1. On the Workloads page, select the check box next to the workload you want to replicate.

  2. Click Run Replication in the Workload Commands panel.

  3. Click Execute.

    The workload is transferred to Forge and incremental updates automatically occur, based on the created Protection Tier.

    If Block-level is being used as the transfer method, the protected workload reboots.