Академический Документы
Профессиональный Документы
Культура Документы
Version 5.0
Administrator's Guide
P/N 302-003-386
REV 01
Copyright 2016 EMC Corporation. All rights reserved. Published in the USA.
Published October 2016
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
CONTENTS
Figures
Tables
11
Chapter 1
Getting Started
13
Chapter 2
Dashboard
21
Chapter 3
Protection
35
RecoverPoint Protection................................................................................ 36
Protect Volumes............................................................................................ 37
How to protect volumes....................................................................37
Policy Templates........................................................................................... 52
RecoverPoint 5.0 Administrator's Guide
CONTENTS
Chapter 4
Recovery
127
Chapter 5
RPA Clusters
143
CONTENTS
Chapter 6
Admin
177
Chapter 7
Support
235
RecoverPoint Support..................................................................................236
RecoverPoint Documentation......................................................... 236
EMC Online Support....................................................................... 237
The RecoverPoint Community......................................................... 238
RecoverPoint 5.0 Administrator's Guide
CONTENTS
Chapter 8
Troubleshooting
239
CONTENTS
Chapter 9
Events
283
Normal Events.............................................................................................284
Detailed events........................................................................................... 294
Advanced events.........................................................................................330
CONTENTS
FIGURES
1
2
3
4
5
6
7
8
9
10
11
12
13
FIGURES
10
TABLES
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
Dashboard options........................................................................................................ 22
Status icons.................................................................................................................. 24
Tooltip links...................................................................................................................24
Transfer state.................................................................................................................27
System LimitsSystem tab...............................................................................................29
System LimitsGroup tab.................................................................................................29
System LimitsStorage tab ............................................................................................. 29
System LimitsSplitters tab............................................................................................. 30
Event filter settings........................................................................................................ 31
Protection options......................................................................................................... 36
Toolbar options............................................................................................................. 40
Group summary screen.................................................................................................. 49
Multiple consistency group monitoring options............................................................. 62
Multiple consistency group actions................................................................................62
Group policies............................................................................................................... 63
Link policies.................................................................................................................. 65
Copy policies................................................................................................................. 69
Journal policies..............................................................................................................69
Status tab......................................................................................................................74
Status tab options when a group is selected..................................................................75
Priority setting default values........................................................................................ 80
Consolidated statistics output....................................................................................... 83
Status tab......................................................................................................................88
Status tab options when a group is selected..................................................................88
Copy journal tab............................................................................................................ 92
Journal Tab: Snapshot Consolidation Progress information............................................ 94
Journal tab image list.....................................................................................................94
Options....................................................................................................................... 105
Snapshot policies........................................................................................................121
RPA cluster options......................................................................................................144
RPA cluster information............................................................................................... 145
Storage information.....................................................................................................148
Resource pool storage information.............................................................................. 157
Volume information..................................................................................................... 162
RPA table information.................................................................................................. 166
Properties tab information........................................................................................... 167
Status tab information.................................................................................................168
Virtual machine info.................................................................................................... 174
RPA Clusters: Add vCenter Server.................................................................................175
Edit vCenter Server Settings.........................................................................................175
Admin options............................................................................................................. 178
Displayed license information..................................................................................... 181
Automatically registering your RecoverPoint system.....................................................183
Pre-defined users........................................................................................................ 188
Pre-defined roles......................................................................................................... 192
Permissions.................................................................................................................192
Permission settings..................................................................................................... 194
LDAP settings.............................................................................................................. 196
System information collection settings........................................................................ 210
Collect system information options..............................................................................214
Event Filter settings..................................................................................................... 217
RecoverPoint 5.0 Administrator's Guide
11
TABLES
52
53
54
55
56
57
58
59
60
61
62
63
12
Email settings..............................................................................................................219
Syslog settings............................................................................................................ 220
SNMP settings............................................................................................................. 221
RecoverPoint SNMP trap variables............................................................................... 222
System parameters sent to SyR....................................................................................226
Licensing support........................................................................................................ 250
Cluster information......................................................................................................268
License file variables................................................................................................... 269
Journal size with snapshot consolidation equation legend...........................................273
Normal scope events................................................................................................... 284
Detailed scope events................................................................................................. 294
Advanced scope events............................................................................................... 330
CHAPTER 1
Getting Started
This section describes the first steps to setting up your RecoverPoint system.
l
l
l
l
l
Getting Started
13
Getting Started
Procedure
1. Open a web browser and enter the cluster management IP into your browser address
bar. The RecoverPoint login screen is displayed.
2. In the RecoverPoint login screen, log in with your username and password, or enter the
default RecoverPoint Username admin and Password admin.
3. If:
l
14
this is your first time logging into Unisphere for RecoverPoint, The Getting Started
wizard on page 15 is displayed. Use the Getting Started wizard to add your
RecoverPoint licenses, enable support, and register your RecoverPoint system.
Getting Started
this is not your first time logging into Unisphere for RecoverPoint and a new
version of RecoverPoint is available The Upgrade Recommendation dialog box on
page 250 is displayed.
Results
Unisphere for RecoverPoint is displayed.
After you finish
Select RPA Clusters > RPA-Cluster-Name > RPAs. Click the tab of each RPA cluster and
ensure that a green checkbox appears in both the Status and Connectivity columns of all
RPAs at each RPA cluster.
Note
The settings in the Add Licenses screen are displayed both through the Getting Started
Wizard the first time you launch Unisphere for RecoverPoint, and by selecting Admin >
Manage Licenses.
Procedure
1. Install a license on page 179.
2. Click Next Enable Support to go to the Enable Support screen on page 16.
15
Getting Started
Note
The settings in the Enable Support screen are displayed both through the Getting Started
Wizard the first time you launch Unisphere for RecoverPoint, and by selecting Admin >
System Notifications > Configure System Reports and Alerts.
Procedure
1. Configure system reports and alerts on page 227.
2. Ensure that system reports are configured correctly on page 229 by clicking the Test
Connectivity button.
Note
The connectivity test, if successful, sends a call home event (number 30999) to the
EMC Install Base and opens a Service Request with EMC Customer Support. If a
verification email is provided, EMC Customer Support sends an email to the entered
email address to verify that the system reports mechanism (SyR) has been
successfully configured.
3. Click Next Register RecoverPoint.
16
Getting Started
Note
The settings in the Register RecoverPoint screen are displayed through both the Getting
Started Wizard the first time you launch Unisphere for RecoverPoint, and by selecting
Admin > Register RecoverPoint each subsequent time Unisphere for RecoverPoint is
launched.
Procedure
1. Register your RecoverPoint system on page 182.
2. Click the Finish button to close the Getting Started Wizard and apply your changes.
A dialog box is displayed allowing you to decide whether or not you would like to
display the Getting Started Wizard in subsequent RecoverPoint launches.
NOTICE
It is not recommended to select the checkbox in the pop-up until you have completed
the tasks of adding your licenses, enabling RecoverPoint support, and registering your
RecoverPoint system.
17
Getting Started
Note
The Status Bar that consistently appears at the bottom of the interface displays the
numbers of alerts that are currently in the system, and their severity (for example, Alerts:
1 Critical, 3 Errors, 3 Warnings. When you click the status bar from any screen in the
application, you are redirected back to The RecoverPoint Dashboard on page 22.
Getting Started
Once replication has been configured and started, you normally wont need more than
minimal involvement with the system.
To troubleshoot your system, if required, refer to The RecoverPoint Dashboard on page
22, Manage Protection on page 61 and Manage Recovery on page 139.
The types of event notification in RecoverPoint, and how to configure events is detailed in
System Notifications on page 215.
Note
RecoverPoint contains intelligent System Analysis Tools on page 200. Use these tools to
help you make your replication environment as efficient as possible.
Configuring replication
After you have completed the First steps in RecoverPoint on page 19, configure the
RecoverPoint system to start replication. The entire process is described step-by-step in
Protecting Volumes on page 37.
19
Getting Started
System analysis
RecoverPoint contains intelligent System Analysis Tools on page 200 to help you make
your replication environment as efficient as possible.
RecoverPoint support
If you need support, use the Support on page 236 tab to easily access all of the
RecoverPoint support options on support.emc.com.
For troubleshooting issues, be sure to collect system information on page 209 before
contacting EMC Customer Support.
20
CHAPTER 2
Dashboard
This section describes the RecoverPoint dashboard and how to use it to analyze and
monitor replication in RecoverPoint.
l
l
l
l
Dashboard
21
Dashboard
Option
When to use
Overall Health
System Limits
22
Dashboard
Overall Health
The Overall Health tab graphically displays an overview of the current status of the
RecoverPoint system. The overall health tab contains widgets that allow you to easily
monitor and analyze the current state of the system.
The Overall Health tab of the Dashboard contains the following widgets:
l
Alerts on page 25
Overall Health
23
Dashboard
The RPA clusters map displays the type of connection that exists between all RPA clusters
in the system. A dashed line represents an IP (WAN) connection and a solid line
represents a Fibre Channel (LAN) connection.
The RPA clusters map also displays the status of all major components in the system that
are seen by the RPA cluster, including; hosts, switches, storage devices, individual RPAs,
the LAN, and the WAN.
When the system detects a problem with one of these major components, the RPA
clusters map displays:
Table 2 Status icons
Icon
Description
An error icon on each component that is not functioning properly.
A warning icon on each component that has warnings associated with it.
The status of a component, particularly until you have completed logging in to
the system, may also be Unknown. In that case, the icon is displayed on the
component.
Note
The errors and warnings in the RPA clusters map widget are also displayed in the
Alerts on page 25 widget.
Hover your cursor over an RPA cluster in the map to display a tooltip with the following
links:
Table 3 Tooltip links
Option
Description
Display Alerts
To display the Alerts dialog box containing the number of alerts registered by
the RPA cluster.
Click Details in the Alerts dialog box to display the alert texts.
Display RPA
To display the General Cluster Info on page 144.
Cluster Details
Multipath monitoring
When multipathing monitoring is active, the system analyzes network errors at the level
of individual paths, and generates a warning in the RPA Clusters Map whenever there is
not full redundancy between the RPA and splitters or volumes. Full redundancy is defined
as follows:
24
For RPA-to-volume links, there must be at least two distinct paths between each RPA
and volume; that is, each RPA has access to at least two storage WWNs (and
controllers, where relevant) via non-overlapping paths.
For RPA-to-splitter links, there must be at least two distinct paths between each RPA
and each splitter using different RPA ports and host (or switch) WWNs.
Dashboard
When RPA Multipath Monitoring is enabled, the system issues a warning upon logging in
regarding any existing links without full redundancy. In addition, warning events are
written to the log.
By default, multipath monitoring is active for all copies, for links both to storage and to
splitters.
To enable or disable RPA multipath monitoring, use the
config_multipath_monitoring CLI command.
Note
Alerts
The Alerts widget provides a graphical overview of system health categorized by alert
level.
Figure 2 Alerts widget
Click the More details link at the bottom-right corner of the graph to display the alerts
table.
The alerts table contains system errors and warnings. The errors and warnings are
composed of messages from the System Limits screen, and other general system
warnings.
Alerts
25
Dashboard
Hover over an error or warning in the table to display a tooltip containing the error or
warning properties.
When relevant, the dialog will show a severity, category, relevant RPA cluster, and
description of the error or warning.
Note
A system limit with a status of Critical equates to an Error in the alerts table. A system limit
with a status of Major or Minor equates to a Warning in the alerts table.
Click the Less details link at the bottom of the alerts table to close the alerts table and
display the Alerts widget.
System Traffic
The System Traffic widget provides a graphical overview of the amount of SAN and WAN
traffic passing through each RPA cluster.
26
Dashboard
Each consistency group and consistency group copy can be in any one of the following
transfer states:
Table 4 Transfer state
Transfer
State
Description
Active
Active
Data is being transferred synchronously to a copy.
(Synchronized
)
Paused
Data is not being transferred to a copy, because transfer has been paused by the
user.
Paused by
system
Data is not being transferred to a copy, because transfer has been paused by the
system.
Init (n%)
High-load
The system enters a permanent high-load state while data is being transferred to
a copy.
High-load (n
%)
The system enters a temporary high-load state while data is being transferred to
a copy.
Replicating
snap
Snap idle
N/A
Data is not being transferred to a copy, because the copy has been disabled by
the user.
The pie chart in the consistency group transfer status widget presents a breakdown of the
consistency groups in the system based on their current data transfer states, as follows:
l
Active (green) - includes active, active (synchronized), Replicating snap and Snap idle
Error (red)
Init (orange) - includes initializing, high load, and high load (n%)
27
Dashboard
Other (brown) - includes flushing, flushing buffer, flushing remote buffer to journal, and
unknown
Note
A consistency groups transfer state is determined by its most severe link state. For
example, in a RecoverPoint system that is replicating to two copies, if one link is paused
and one link is active, the transfer state will be set as paused.
If there are no consistency groups in the system, the chart will be replaced by the text No
consistency groups.
Hover your mouse over a transfer state in the chart to see the names of the consistency
groups in that state.
System Limits
The System Limits tab monitors important system values to let the user know how close
they are to their limits. The limits may be determined by the system, policies, licensing, or
limitations of external technologies.
Figure 4 Dashboard > System Limits tab
System
The following information is displayed in the System tab:
28
Dashboard
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its
limit.
Description
RPA Cluster
RPA
Current Value of
Limit
Groups
The following information is displayed in the Groups tab:
Table 6 System Limits > Group tab
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Description
Group
Copy
Current Value
of Limit
Storage
The following information is displayed in the Storage tab:
Table 7 System Limits > Storage tab
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Description
RPA Cluster
Array
Current Value
of Limit
Splitters
The following information is displayed in the Splitters tab (not relevant to XtremIO):
Groups
29
Dashboard
Column
Description
Status
OK, minor, major, critical. Indicates how close a monitored setting is to its limit.
Description
RPA Cluster
Splitter
Current Value
of Limit
System Events
The System Events tab displays the RecoverPoint event log which contains all events
logged by the RecoverPoint system, in the order that they are logged. A total of 9000
events can be displayed in the event log.
Figure 5 Dashboard > System Events
Display events
To display system events; select Dashboard > System Events tab.
The RecoverPoint event log is displayed, containing the last 9000 events logged in the
RecoverPoint system. Each event in the event log is displayed along with its relevant
event ID, summary, level, scope, point in time, RPA cluster, and topic.
30
Dashboard
Note
By default, only Normal scope events are displayed, but you can also Filter events on
page 31 to display Detailed events.
Sort events
To sort the events in the event log by ID, summary, level, scope, point in time, RPA
cluster, or topic, click on the relevant column header but you can also Filter events on
page 31 based on advanced criteria.
Filter events
Use the following procedure to filter the events in the System Events on page 30 log, and
save the settings for the current RecoverPoint user.
Procedure
1. Select Dashboard and click the System Events tab.
2. Click Filter Events. The Event Filter dialog box is displayed.
Setting
Values
From
The date and time (in GMT) from which events are to be displayed.
Select Unbounded to display the 9000 events preceding the date and time
specified in the To field.
To
The date and time (in GMT) until which events are to be displayed. Select
Unbounded to display all events up until the current date and time.
31
Dashboard
Setting
Values
Events to
Exclude
The IDs of the events that should not be displayed. Multiple event IDs can be
entered. Separate multiple event IDs with a comma.
Topics
The topic of the events to display in the event log. Valid values are:
Scope
Level
RPA cluster
Splitter
Consistency group
Management
RPA
Array
Normal: To display only the root cause for an entire set of Detailed and
Advanced events. In most cases, these events are sufficient for effective
monitoring of system behavior.
Advanced: In specific support cases, EMC Customer Support may ask you to
display events in an Advanced scope. These events contain information that
is intended primarily for the technical support engineers.
Containing the Enter the terms that must exist in the event summary in order for the event to be
text
displayed in the event log. Use commas to separate multiple terms. Select:
l
Match all to display all events containing all of the specified terms in the
event summary.
Match any to display all events containing any of the specified terms in the
event summary.
Reset to
Default
To reset all of the settings in the Event Filter dialog box to their default settings.
OK
To close the Event Filter dialog box, and apply the specified settings.
Cancel
To close the Event Filter dialog box, without applying the specified settings.
Dashboard
2. Select the event in the event log and click Copy to Clipboard.
Results
The event info that is copied to the clipboard is in the following format:
Summary: RPA is successfully communicating with its cluster.
Level: Clear
ID: 3000
Topic: RPA
Scope: Normal
Point in Time (GMT): 4/17/2013 8:46:35 AM
RPA Cluster: London
Description : RPA is successfully communicating with its
cluster(RPA2)
33
Dashboard
34
CHAPTER 3
Protection
This section describes how to protect volumes, and how to monitor and manage
protection and consistency.
l
l
l
l
l
RecoverPoint Protection........................................................................................ 36
Protect Volumes.................................................................................................... 37
Policy Templates................................................................................................... 52
Group Sets............................................................................................................ 56
Manage Protection................................................................................................ 61
Protection
35
Protection
RecoverPoint Protection
In Unisphere for RecoverPoint, data protection is guided by wizards, and performed
through the Protection menu.
36
Option
When to Use
Protect
Volumes
Policy
Templates
Group Sets
Manage
Protection
To manage and monitor existing consistency groups and their protection plans,
control transfer, or bookmark consistent points in time across groups and sets of
groups.
Protection
Protect Volumes
Use Protection > Protect Volumes to create consistency groups (CGs) to protect your
volumes. In RecoverPoint, CGs are used to configure protection policies, and set RPO and
RTO policies according to specific resource allocation and prioritization.
For RecoverPoint with Unity, VNXe, or VNX with RecoverPoint/SE licenses, there is a
limitation of one array per side. If you have a local and a remote copy, make sure the
local copy is stored on the same Unity/VNXe/VNX array as the production copy.
Ensure you have your RecoverPoint environment planning document describing the
groups and journals you will need to create, the volumes that you will need to define
in each, and the RPAs that will handle the data transfer. If you do not have this
document, contact your RecoverPoint account executive.
Your environment planning document should detail:
The number of consistency groups that you will need, and their names.
The priority of each consistency group with relation to the other groups in the
system.
Decide whether you will want to Initialize from backup on page 254, and prepare
accordingly.
When a consistency group is first created, or a replication set is first added to the
system, the system automatically starts a first-time initialization process at the
Protect Volumes
37
Protection
copies (that is, synchronizing the copy volumes with the production volumes by
sending the complete image of each production volume to each copys storage).
Depending on the amount of data being transferred, this process can be both timeconsuming and bandwidth-consuming. To save time and bandwidth, see First-time
initialization is taking too long on page 253.
l
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that copy
must be on the same array.
Ensure you have mapped all replication LUNs to RecoverPoint WWNs. Only the
volumes that are mapped and zoned to the RPA cluster are displayed in the available
volumes list in RecoverPoint.
Note
In RecoverPoint/SE only, all of the volumes of the Unity or VNX array are displayed in
the available volumes list.
l
There is a limit on the number of LUNs that are supported per storage group (see
the EMC RecoverPoint Release Notes for this limit).
If you need more LUNs than are currently available to support your replication sets
and journals, either because you have calculated your system needs or because
you have received a message that you have exceeded the maximum number of
supported LUNs, you may be able to create additional storage groups, according
to the procedure presented in Add more LUNs than allowed per VNX storage
group on page 264.
38
If any volume added is a device on a Symmetrix VMAX 10K, 20K or 40K array, refer
to Device Tagging in the EMC RecoverPoint Deploying with Symmetrix Arrays and
Splitter Technical Notes.
The same consistency group can contain volumes attached to multiple splitters.
The same consistency group can contain volumes using a VNX splitter to split
writes to one RPA cluster and volumes using a different splitter type to split writes
to a different RPA cluster.
The VPLEX consistency group name will only be displayed in the VPLEX Group
column of the volume list if you Attach volumes to the splitter on page 164 for the
VPLEX splitter (including certificate).
After you register your VPLEX storage, you will not be able to select VPLEX volumes
and non-VPLEX volumes in the same consistency group copy. It is recommended
that all volumes in a VPLEX consistency group be configured in a single
consistency group copy, and all volumes in a non-VPLEX consistency group be
configured in another consistency group copy.
Protection
For replicating Oracle databases, see the instructions on how to replicate an Oracle
database, including using Oracle hot backup procedures with RecoverPoint
bookmarks for point-in-time snapshots and quick testing and disaster recovery in the
EMC RecoverPoint Replicating Oracle with EMC RecoverPoint Technical Notes.
Procedure
1. Select Protection > Protect Volumes.
2. In the Select Production Volumes screen:
a. Define the consistency group name, the production name, and the RPA cluster that
will manage the production.
Note
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array. Use the toolbar at the top-right corner of the
screen to help you identify the volumes.
39
Protection
Icon
Description
To filter the volumes in the list by Size, Product, Vendor, Name, UID, LUN,
or VPLEX Group.
Note
The VPLEX Group column is only displayed after you Attach volumes to the
splitter on page 164 for your VPLEX splitter.
To select the table columns that you want to display.
Note
You can also click and drag the column dividers to make the columns
wider or thinner. In most cases, RecoverPoint will remember the column
width that you define, and display the columns accordingly in each
subsequent launch of this wizard.
To export the data in the volume list to a *.CSV file.
To display context-sensitive help for this wizard screen.
c. Optionally, click Modify Policies to define the group policies and copy policies
now, or skip this step and define the policies later.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is a
specific business need to set other policies.
d. Click Next Define the Production Journal to select journal volumes that have
already been provisioned on storage. on page 40
40
If your copy volumes are located on a Unity, VNXe, or VNX array and a resource pool
has been registered on page 158 on the same array for the journal volume, select
Automatically Provision Journal Volumes to allow RecoverPoint to provision your
journal volumes.
For applications running on a host cluster, the journal volumes must not be resources
of the host cluster.
If you selected the MetroPoint group checkbox in the previous screen of the wizard,
the Standby Production screen is displayed.
Protection
In the Standby Production screen, enter a name for the copy in the Standby
production copy name field before you continue with this procedure.
Procedure
1. Ensure Select Provisioned Journal Volumes is selected.
The journal for an XtremIO array need not be larger than 10 GB for a copy with nondistributed consistency groups, 40 GB for distributed consistency groups.
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped and
zoned to the RPA cluster are displayed in the available volumes list.
In RecoverPoint/SE, all of the volumes of the supported Unity Series and VNX Series
arrays are displayed in the available volumes list.
How to protect volumes
41
Protection
3. Use the toolbar icons at the top-right corner of the screen to help you identify the
required volumes in the volume list. For best performance, select volumes that are
identical in size. If identically sized volumes are not available, select volumes that are
similar in size.
Note
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped and
zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported Unity Series and VNX Series
arrays are displayed in the available volumes list.
4. Optionally, click Modify Policy to define the journal policies now, or skip this step and
define the policies later using the Manage Protection screen.
Note
The Modify Policy link is only enabled after volumes are selected in the volume list.
5. Optionally, apply a policy template.
a. Use the Select Template drop-down to select one of your policy templates.
b. Click Load to load the settings in the template.
c. Click OK to apply the settings.
6. Click Next Add a Copy on page 44.
A resource pool has been registered on the Unity, VNXe, or VNX array containing the
copy volumes.
Procedure
1. Select Automatically Provision Journal Volumes.
42
Protection
Description
Journal size
Enter a value for the journal size to define an absolute journal size
at the copy.
Predicted
Select this option and enter a value for predicted incoming writeincoming write- rate and required protection window to have RecoverPoint
rate
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to
sustain the entered values for predicted incoming write-rate and
the required protection window is dynamically updated in the
Calculated journal size field.
Required
protection
window
Note
Tiering Policy
Back to Select
Production
Volumes
3. If there are Available Tiering Policies on storage, you can select a Tiering policy to
apply to the journal volumes from the combo-box at the bottom of the resource pool
table now.
4. Select the relevant resource pool from the table.
The following information is displayed for each resource pool in the table:
Information
Description
Name
Type
Total Size
RAID groups
Storage groups
Datastores
43
Protection
Information
Description
Available Size
Tiers
Available Tiering
Policies
Storage Name
Serial Number
Array Type
IP
Adding a copy
Procedure
1. In the Add a Copy screen:
a. Define the copy name, the RPA cluster that will manage the copy volumes, and the
replication mode on page 65.
For each production volume, click the Select volume link to add a volume to the
copy. The selected volume is the volume that the production volume is replicated
to.
The volume list is displayed. The volume list only contains volumes of sizes that
are equal to, or greater than, the specified production volume.
44
Protection
Note
If one volume in a copy is on an XtremIO array, all the volumes in the consistency
group at that copy must be on an XtremIO array. If the copy is on an XtremIO array,
it must be exactly the same size as all other copies in the consistency group. It
cannot be either larger or smaller.
Note
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped and
zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported Unity Series or VNX Series
array are displayed in the available volumes list.
Use the toolbar icons at the top-right corner of the screen to help you identify the
required volumes in the volume list. For best performance during failover, select
volumes that are the same size as the production volume. If volumes of the same
size are not available, select volumes that are as similar in size as possible.
NOTICE
You cannot proceed to the next step until the replication sets icon under the
volume list shows a green check mark to indicate that the number of replication
sets is equal to the number of production volumes.
b. Optionally, click Modify Policy to define the copy policies and link policies now, or
skip this step and define the policies later from the Manage Protection screen.
If you want to change the protection settings using policy templates, in the Link
tab, use the Select Template drop-down to select one of your templates. Click Load
to load the settings in the template and click OK to apply the settings.
How to protect volumes
45
Protection
Note
The Modify Policy link is only enabled after volumes are selected in the volume
list. You can set a copy policy for the production, however, the copy policy of the
production is only relevant after failover, when the production becomes a copy.
c. Click Next Define Copy Journal and:
l
Select copy journal volumes that have already been provisioned on storage on
page 46.
For applications running on a host cluster, the journal volumes must not be resources
of the host cluster.
Procedure
1. Ensure Select Provisioned Journal Volumes is selected.
The journal for an XtremIO array need not be larger than 10 GB for a copy with nondistributed consistency groups, 40 GB for distributed consistency groups.
3. Use the toolbar icons at the top-right corner of the screen to help you identify the
required volumes in the volume list. For best performance, select volumes that are
46
Protection
identical in size. If identically sized volumes are not available, select volumes that are
similar in size.
Note
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped and
zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported Unity Series or VNX Series array
are displayed in the available volumes list.
4. Optionally, click Modify Policy to define the journal policies now, or skip this step and
define the policies later using the Manage Protection screen.
Note
The Modify Policy link is only enabled after volumes are selected in the volume list.
5. Optionally, apply a policy template.
a. Use the Select Template drop-down to select one of your policy templates.
b. Click Load to load the settings in the template.
c. Click OK to apply the settings.
6. Click Next Display Group Summary on page 49.
A resource pool has been registered on the Unity, VNXe, or VNX array containing the
copy volumes.
Procedure
1. Select Automatically Provision Journal Volumes.
47
Protection
Option
Description
Journal size
Enter a value for the journal size to define an absolute journal size
at the copy.
Predicted
Select this option and enter a value for predicted incoming writeincoming write- rate and required protection window to have RecoverPoint
rate
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to
sustain the entered values for predicted incoming write-rate and
the required protection window is dynamically updated in the
Calculated journal size field.
Required
protection
window
Note
Tiering Policy
Back to Select
Production
Volumes
3. If there are Available Tiering Policies on storage, you can select a Tiering policy to
apply to the journal volumes from the combo-box at the bottom of the resource pool
table now.
4. Select the relevant resource pool from the table.
The following information is displayed for each resource pool in the table:
48
Information
Description
Name
Type
RAID groups
Storage groups
Datastores
Total Size
Available Size
Protection
Information
Description
Tiers
Available Tiering
Policies
Storage Name
Serial Number
Array Type
IP
a. Use the following options until the consistency group diagram reflects your
requirements:
Table 12 Group summary screen
Action
Description
Edit
Opens the Add a Copy screen of the copy whose Edit link you clicked,
allowing you to edit the copy settings, and modify the copy volume
configuration, replication mode, or protection plan.
Delete
Removes the copy whose Delete link you clicked, from the consistency
group.
49
Protection
Action
Description
Note
Replication
Sets
Note
50
Protection
Action
Description
Add a Copy
Opens the Add a Copy screen, allowing you to create another copy, define
the new copys settings, and define the copys volume configuration,
replication mode, and protection plan.
Finish
Note
Before you start transfer to any copy, ensure that the copy volumes are
unmounted from any hosts and any volume groups are deported from the
logical volume manager.
Creates the group, applies all of the specified settings, and starts a firsttime initialization process to synchronize the production volumes to the
copy volumes.
Before you click Finish, note the following:
l
51
Protection
Policy Templates
Use Protection > Policy Templates to view or modify existing protection policy templates
or create new protection policy templates, for copies or links.
Policy templates are re-useable pre-defined protection settings for both copies and links.
Three default policy templates are included in RecoverPoint; default copy, default remote
link and default local link.
Policy templates work in the following way, the user:
1. Modifies an existing policy template or creates a new policy template.
2. Applies the settings in the policy template to existing links or copies using the
Protect Volumes wizard or the Manage Protection screen.
2. You cannot remove the default policy templates, but you can create new ones on page
53 based on the default template settings and modify on page 53 any of the userdefined policy templates.
52
Protection
Only users with Group permissions can create new policy templates.
Use the Copy policy template to control your Journal policies on page 69.
If a policy template contains an invalid value for an array, you will not be able to
apply it to a consistency group. For example, if you select Enable RecoverPoint
Snapshot Consolidation and try to apply the template to copy on an XtremIO array,
loading the template will fail because RecoverPoint snapshot consolidation is not
supported on XtremIO arrays.
Procedure
1. Select Protection > Policy Templates.
2. In the list of policy templates, click Add.
When you modify a policy template, all settings based on the template do not
automatically change. You will need to re-load and apply the modified policy
template to use the new settings.
Create new policy templates
53
Protection
Use the Copy policy template to control your Journal policies on page 69.
If a policy template contains an invalid value for an array, you will not be able to load
it to the array. For example, if you select Enable RecoverPoint Snapshot
Consolidation and then try to apply the template to a copy on an XtremIO array,
loading the template will fail because RecoverPoint snapshot consolidation is not
supported on XtremIO arrays.
You cannot modify any of the default Policy Templates on page 52.
Procedure
1. Select Protection > Policy Templates.
2. In the list of policy templates, select a template and click Edit.
You cannot remove the default Copy and Link policy templates, and you cannot
change their settings. You can, however, create new policy templates and base them
on the settings of the default policy templates.
Procedure
1. Select Protection > Policy Templates.
2. In the list of policy templates, select a template.
3. Click Remove, and click Yes in the confirmation dialog box.
54
Protection
55
Protection
Group Sets
Use Protection > Group Sets to create or modify sets of consistency groups, perform
operational and recovery activities, and periodically bookmark the same consistent point
in time across volumes in multiple groups, simultaneously.
Note
Parallel bookmarks cannot be enabled for group sets containing consistency groups with
volumes that reside on an XtremIO array or a Data Domain.
56
Protection
Only users with Group permissions can add, edit or remove group sets.
The Enable, Disable, Start Transfer, and Pause Transfer buttons are only enabled if
they are relevant for at least one of the groups in the group set.
Procedure
1. Select Protection > Group Sets.
2. All of the group sets in the system are displayed, along with their system information.
Parallel bookmarks cannot be enabled for group sets containing consistency groups
with volumes that reside on an XtremIO array or a Data Domain.
Only users with Group permissions can add, edit or remove group sets.
You cannot create the group set if any of the groups that you want to include are
already part of another group set that has parallel bookmarking enabled.
You cannot create the group set if any of the groups that you want to include
contain links for which snap-based replication mode has been enabled.
You cannot create a group set if one of its groups is not replicating in the same
direction (that is, from the same source) as other groups in the group set.
Although groups with mixed topologies (that is, with a different number of copies)
can be included in the same group set, for recovery purposes, this is not
recommended.
57
Protection
Procedure
1. Select Protection > Group Sets .
2. Click Add. The Add Group Set dialog box is displayed.
Parallel bookmarks cannot be enabled for group sets containing consistency groups
with volumes that reside on an XtremIO array.
Procedure
1. Select Protection > Group Sets .
2. Select a group set in the list of group sets.
58
Protection
Procedure
1. Select Protection > Group Sets .
2. Select one or more group sets in the list of group sets.
3. Click Remove.
59
Protection
The Enable and Disable buttons are only enabled if they are relevant for at least one
of the groups in the group set.
Procedure
1. Select Protection > Group Sets .
2. Select the group set from the list of group sets.
3. Click Enable or Disable.
The Start Transfer and Pause Transfer buttons are only enabled if they are relevant
for at least one of the groups in the group set.
Procedure
1. Select Protection > Group Sets .
2. Select the group set from the list of group sets.
3. Click Start Transfer or Pause Transfer.
60
To test a copy, undo writes, enable direct access or disable image access for all
consistency groups in a group set:
n
Select Protection > Group Sets. Select a group set from the list of group sets, click
Test Copies, and follow the instructions in Test a Copy on page 128.
Select Recovery > Test a Copy and follow the instructions in Test a Copy on page
128.
To test a copy and recover production of all consistency groups in a group set:
Protection
Select Protection > Group Sets. Select a group set from the list of group sets, click
Recover Production, and follow the instructions in Test a Copy and Recover
Production on page 132.
Select Recovery > Recover Production and follow the instructions in Test a Copy
and Recover Production on page 132.
To test a copy and fail over all consistency groups in a group set:
n
Select Protection > Group Sets. Select a group set from the list of group sets, click
Fail Over, and follow the instructions in Test a Copy and Fail Over on page 135.
Select Recovery > Fail Over and follow the instructions in Test a Copy and Fail
Over on page 135.
Manage Protection
Use the Manage Protection screen to manage and monitor your existing consistency
groups and their protection plans, control transfer, and mark consistent points in time
across groups and sets of groups.
When the Manage Protection screen is first displayed, the Consistency Groups node is
selected in the left pane, and the list of all consistency groups in the system is displayed
in the right pane along with the status of every consistency group in the RecoverPoint
system.
Manage Protection
61
Protection
Column
Description
Name
Status
Transfer
The group transfer status (Paused, Active, Initializing, etc.). When a group is
configured to transfer data synchronously, the word Synchronized is displayed
next to the state of transfer.
Note
You can also see the data transfer state on page 26 of consistency groups
through the Consistency Group Transfer Status on page 26 widget in the
Dashboard.
Alerts
The number of alerts that have been logged for a group. If alerts have been
logged, click the link to display the alert texts.
Protected Size The size of the data that is being protected by the group.
Active RPA
Group Set
The group set name, if the group has been added to a group set.
You can also perform the following actions on multiple groups in the system
simultaneously, by clicking the relevant button at the bottom of the screen:
Table 14 Multiple consistency group actions
Button
Description
Cannot be undone.
Enable Group
Note
Only enabled if the selected consistency groups are disabled. Enables the
selected consistency groups.
Enabling a disabled consistency group starts replication and causes a full
sweep.
Disable Group
Only enabled if the selected consistency groups are enabled. Disables the
selected consistency groups.
Note
Disabling a consistency group stops all replication, deletes journals, and causes
a full sweep when the group is enabled.
Create
Bookmark
62
Create a bookmark and define snapshot policies across multiple groups on page
123
Protection
There are various advanced protection policies that cannot be accessed through
Unisphere for RecoverPoint, and can only be configured using the RecoverPoint CLI. See
the EMC RecoverPoint CLI Reference Guide for your RecoverPoint product version for more
information on these policies.
Group policies
Describes the policy settings for consistency groups.
To display these settings, select Protection > Manage Protection, select a consistency
group in the left pane, and click the Group Policy tab in the right pane.
Table 15 Group policies
Setting
Description
Group Name
Primary RPA
The RPA that you prefer to replicate the consistency group. When the primary RPA
is not available, the consistency group will switch to another RPA in the RPA
cluster. Whether data will transfer when replication is switched to another RPA
depends on the value of the transfer_by_non_preffered parameter of the
config_group_policy CLI command.
Note
Priority
Default = Normal
Only relevant for remote replication over the WAN or Fibre Channel, when two or
more consistency groups are using the same Primary RPA.
Select the priority assigned to this consistency group. The priority determines the
amount of bandwidth allocated to this consistency group in relation to all other
consistency groups using the same Primary RPA.
Possible values are:
l
Idle
Low
Normal
63
Protection
Setting
Description
l
High
Critical
Preferred
Cluster
Note
Both enabling and disabling this setting causes the journal of all copies in the
consistency group to be lost.
Before changing this setting, ensure all preferred RPAs (both primary and
secondary) are connected by Fibre Channel and can see each other in the SAN .
External
Application
Recovery
Copy
64
Default=none
Possible values are None and SRM.
l
SRM: To enable support for VMware Site Recovery Manager. This option is
only valid if a RecoverPoint Storage Replication Adapter for VMware Site
Recovery Manager is installed on the vCenter Servers. For more information,
refer to the EMC RecoverPoint Adapter for VMware Site Recovery Manager
Release Notes.
Specifies which copy the external application should fail over to.
Protection
Setting
Description
External
Only relevant for MetroPoint configuration and if External Application = SRM.
Management
SRM supports only one production copy. When RecoverPoint is managed by
Side
Managed by
When any value other than None is selected, Managed By is enabled and you
have the following options:
l
Link policies
Describes the policy settings for the links between two copies.
Table 16 Link policies
Setting
Description
Asynchronous
Default=enabled
When enabled, RecoverPoint replicates the consistency group data in
asynchronous replication mode.
Snap Replication
Default=disabled
When enabled, RecoverPoint replicates the consistency group data in
asynchronous, snap-based replication mode.
Possible values:
The RecoverPoint protection policies
65
Protection
Setting
Description
l
Periodic: A new snap starts after the specified interval has passed
since the previous snap was started. If the time interval has passed,
but the previous snap has not been finished, the next snap will start
as soon as the previous one is finished. Sets the interval between
snaps to any value between 30 and 1440 minutes. When set to
Periodic, an interval should be defined. The default interval is 30
minutes. The RPO will be twice the specified interval, and cannot be
changed.
Note
Synchronous
Note
Dynamic by latency
Note
66
Protection
Setting
Description
l
Dynamic by
throughput
Note
RPO
Default = 25 seconds
This setting defines the required lag of the each link in a consistency
group, and is set manually in MB, GB, writes, seconds, minutes, or hours.
In RecoverPoint, RPO starts being measured when a write made by the
production host reaches the local RPA, and stops being measured when
the write reaches either the target RPA or the target journal (depending
on the value of the transfer_by_non_preferred parameter of the
config_group_policy CLI command).
When the value of the regulate_application parameter of the
config_link_policy CLI command is set to no (default is no), the
specified RPO is not guaranteed. RecoverPoint will try its best to replicate
within the specified RPO without affecting host performance.
Compression
Note
67
Protection
Setting
Description
Note
Only relevant for asynchronous remote replication. Both the enabling and
disabling of compression causes a short pause in transfer and a short
initialization. Compression decreases transfer time, but increases the
source RPAs CPU utilization.
l
High: Yields the highest bandwidth reduction ratio and requires the
most RPA resources.
Low: Yields the lowest bandwidth reduction ratio and requires the
least RPA resources.
Enable
Deduplication
Note
Snapshot
Granularity
Note
68
Fixed (per write): To create a snapshot for every write operation, over
a specific (local or remote) link.
Protection
Setting
Description
Note
Copy policies
To display the copy policy settings, select Protection > Manage Protection, expand a
consistency group, select one of its copies, and click the Copy Policy tab.
Table 17 Copy policies
Setting
Description
Host OS
Default = Other/Mixed
The operating system of the host writing to the volumes in the consistency group.
Clear journal
Note
upon
Only relevant in ProtectPoint
removal
Journal policies
To display the journal policies, select Protection > Manage Protection, expand a
consistency group and select one of its copies. Then, click the Copy Policy tab and note
the settings in the Journal Policy section.
Table 18 Journal policies
Setting
Description
Journal
Compression
Note
69
Protection
Setting
Description
Note
Maximum
Journal Lag
Note
The industry term RTO includes the time during which the disaster was being
fixed, the actual disaster recovery, testing, and communication to the users.
The RTO setting in RecoverPoint only defines the actual disaster recovery
time.
When data is received by the RPA faster than it can be distributed to storage
volumes, it accumulates in the journal. The Maximum Journal Lag is the
maximum amount of snapshot data (in bytes, KB, MB, or GB) that is
permissible to hold in the copy journal before distribution to the copy
storage. In other words, the maximum amount of data that would have to be
distributed to the copy storage before failover to the latest image could take
place. In terms of RTO, this is the maximum time that would be required in
order to bring the copy up-to-date with production.
When the Maximum Journal Lag value is reached, the system switches to
three-phase distribution mode, and no longer retains rollback information. As
soon as the lag is within the allowed limits, rollback data is retained again.
Enable
RecoverPoint
snapshot
consolidation
Note
70
Protection
Setting
Description
If no daily or weekly consolidations are specified, the remaining
snapshots are consolidated monthly.
Consolidate snapshots that are older than x to one snapshot per day
for y days
Default = 5 days
Snapshots are consolidated every ~24 hours.
Select the Indefinitely checkbox to consolidate all subsequent snapshots
in ~24 hour intervals.
l
Maximum
Number of
Snaps
Note
71
Protection
Setting
Description
The maximum number of snaps to be saved at the copy (2500). The value of
this setting may change if the detailed consolidation policy is modified.
Required
Protection
Window
Default = disabled
Note
Edit Detailed
Consolidation
Settings
Note
For the detailed consolidation policy values to be valid, the first consolidation
policy in the list must be of the shortest duration and the last policy in the list
must be of the longest duration. The first average snapshot frequency in the
list must be lower than the last.
72
Protection
73
Protection
Results
The Status tab displays a graphical representation of the consistency group and copy
statuses. The following information is displayed:
Table 19 Status tab
Label
Displays
<Group
Name>
Running on
<RPA>
The group name and the RPA which is handling the group data, both of which can
be modified through the group policies. Group policies on page 63 includes
more information about group policies.
<Copy Name>
at <Cluster
Name>
The relevant copy and RPA cluster names. The copy name can be modified
through the copy policies. Copy policies on page 69 includes more information
about copy policies.
Replication
modes and
states
A dashed green line on top of a solid line means that the system is
replicating synchronously.
Note
Role
74
The current role of the copy with regards to failover and regulation.
l
Protection
Label
Displays
Storage
Image
When a group is selected in the left pane, you can click the buttons at the bottom of the
Status tab to perform the following actions:
Table 20 Status tab options when a group is selected
Button
Description
Create
Bookmark
Create a bookmark and define snapshot policies for one group on page 122 by
providing a bookmark name for the current snapshot.
Add Copy
Displays the Add a copy to a group on page 99 wizard, enabling you to add a
copy to the selected consistency group.
Test Copy
Displays the Test a Copy on page 128 wizard, enabling you to select and test a
copy of the selected consistency group.
Fail Over
Note
Recover
Production
Displays the Test a Copy and Recover Production on page 132 wizard, enabling
you to select and test a copy of the selected consistency group, and recover
production from it.
Start
Transfer
Only displayed if transfer is paused for the selected consistency group. Causes
the transfer of writes from the production host to all copies of the selected
consistency group to start.
Pause
Transfer
Only displayed if transfer is active for the selected consistency group. Causes the
transfer of writes from the production host to all copies of the selected
consistency group to pause.
Note
Best practice is not to use this command. Use Group policies on page 63 to set
policies for use of bandwidth. Pause transfer may be used when WAN bandwidth
is very limited and you wish to give the largest bandwidth possible to another
consistency group. In that case, you may temporarily pause transfer for lowerpriority consistency groups.
Disable
Group
Only displayed if the group is enabled for the selected consistency group.
Disables the selected consistency group.
Note
Disabling a consistency group stops all replication, deletes journals, and causes
a full sweep when the group is enabled.
Monitoring and managing groups
75
Protection
Button
Description
Enable
Group
Only displayed if the group is disabled for the selected consistency group.
Enables the selected consistency group.
Note
Remove
Group
Cannot be undone.
When the production copy is on an XtremIO array, only Total Traffic and Initialization
Traffic statistics are available.
76
The Total Traffic widget displays the total traffic that the consistency group data
generates on the RPA transferring the group data at the production and copy sites,
as well as between RPA clusters in your RecoverPoint system (in Mb/sec). The total
traffic includes the Initialization Traffic and the Application Traffic.
The Application Traffic widget displays the traffic that the consistency group
generates on the RPA transferring the group data at the production and copy sites,
Protection
as well as between RPA clusters in your RecoverPoint system (in Mb/sec). The
application traffic includes Incoming Writes as well as RecoverPoint replication
process traffic.
l
The Initialization Traffic widget displays the traffic that the consistency group
generates between copies and RPA clusters in your RecoverPoint system, during
consistency group initialization (in Mb/sec). Initialization traffic can be high, as
old writes are transferred between source and target copies to synchronize
between the production volumes and the copy volumes.
The Incoming Writes widget displays the writes to the production storage that the
consistency group generates at copies in your RecoverPoint system (in writes per
second), where each write is one I/O to the production storage.
The Bandwidth Reduction widget displays the ratio by which RecoverPoint was
able to compress the consistency group data that is transferred between RPA
clusters in your RecoverPoint system. The bandwidth reduction ratio includes both
data compression and deduplication.
Note
77
Protection
The Time Lag widget displays the lag of the selected consistency group (in
seconds), when transferring data between all local and remote RPA clusters in your
RecoverPoint system.
The Write Lag widget displays the lag of the selected consistency group (in writes),
when transferring data between all local and remote RPA clusters in your
RecoverPoint system. The write lag includes any writes generated by RecoverPoint
replication processes as well as internal RecoverPoint overhead.
The Data Lag widget displays the lag of the selected consistency group (in MB),
when transferring data between all local and remote RPA clusters in your
RecoverPoint system.
Enabling deduplication
Before you begin
l
Both the enabling and disabling of deduplication causes a short pause in transfer
and a short initialization.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, click the Link Policy tab.
a. In the Select link to set policy diagram, select the relevant link.
b. In the Bandwidth Reduction section, if Compression is set to None, enable
compression by changing this value to Low, Medium, or High.
c. Check the Enable Deduplication checkbox.
4. Click the Apply button.
NOTICE
78
Display long-term deduplication statistics on page 79the user defines the period
in time for which to generate performance statistics.
Protection
Note
A bandwidth reduction or deduplication ratio value that is not significantly higher than 1
would indicate that the deduplication (and/or compression) process is not very effective.
If so, consider disabling these policies (as they do consume RPA CPU resources).
Both bottleneck detection and exporting consolidated statistics allows you to define the
period in time for which to generate long-term bandwidth reduction and deduplication
ratios.
You should:
n
Evaluate the importance and value of your consistency groups data in relation to
each other, and verify that the default values of the priority on page 63 setting (as
described in the following table) reflect your business objectives. If they do not,
contact EMC Customer Support and ask them to change the values.
79
Protection
Setting Value
Idle
0.01 x Normal
Low
0.5 x Normal
Normal
Normal
High
3 x Normal
Critical
10 x Normal
Note
The lag is optimized only if the bandwidth is the cause of the lag. It is not relevant, for
example, if the lag is caused by the distribution process at the remote site (which can
happen when replicating over Fibre Channel).
The lag optimizer is only relevant for groups replicating asynchronously, that are not
experiencing a high load or an initialization. Groups replicating synchronously are
always prioritized over groups replicating asynchronously.
Procedure
1. Select Protection > Manage Protection
2. In the left pane, select a consistency group.
3. In the right pane, select the Group Policy tab
4. Specify the group Policy setting.
5. In the left pane, expand the group and select a copy.
6. Specify the copy RPO policy, according to your company's business objectives.
80
The snapshot granularity of all links in the consistency group can be set in the link
policies to no smaller than one second.
Journal loss will occur when modifying a groups topology (setting a non-distributed
group as distributed, or setting a distributed group as non-distributed).
When configuring journals for a distributed consistency group, keep the following in
mind:
n
All copies of distributed consistency groups must have journals that are at least
20 GB in size.
The recommended journal size for distributed groups with snapshot consolidation
enabled is at least 40GB.
Protection
If the capacity of an existing copy journal is less than the minimum journal size
required for distributed consistency groups (see the EMC RecoverPoint Release
Notes for this limit) the consistency group will need to be disabled and then
enabled again after you add journal volumes or change the size of a journal LUN
on storage
Enabling a disabled group causes a full sweep.
In Fibre Channel environments, make sure all of the RPAs at each RPA cluster are
connected to the SAN through a Fibre Channel switch, and zoned together so that
they all see each other in the SAN.
If any of the primary or secondary RPAs associated with a consistency group becomes
unavailable, there will be a brief pause in transfer on all of the groups primary and
secondary RPAs, and all of the group segments will undergo a short initialization.
Under certain circumstances (for example, if one of the primary or secondary RPAs
becomes unavailable) two consistency group segments could be handled by the
same RPA.
In general, distributed consistency groups offer better performance than nondistributed (regular) consistency groups, as distributed groups run on a minimum of
two RPAs (one primary RPA and one secondary RPA). There is only a small
improvement in performance when a group is run on three RPAs. However, there is a
steep improvement in performance when a group is run on four RPAs.
The following are example journal configurations for distributed consistency groups:
n
Procedure
1. Review the relevant limitations and performance statistics of distributed groups in the
EMC RecoverPoint Release Notes
2. Select Protection > Manage Protection.
3. In the left pane, select a consistency group.
4. In the right pane, click the Group Policy tab
5. Check or clear the Distribute group checkbox. The Secondary RPA checkboxes are
enabled or disabled accordingly.
6. If you are enabling this feature, select one to three secondary RPAs, by checking the
relevant checkboxes in the Secondary RPA section.
Results
The group writes are distributed across the selected RPAs.
After you finish
To monitor each group segments performance separately, and in relation to the group as
a whole, detect botttlenecks on page 201.
You can tell whether or not a group is distributed by navigating to Protection > Manage
Protection, clicking on a consistency group name in the left pane and looking at the top
of the consistency groups Status tab. If the group is distributed, the text (primary)
Monitoring and managing groups
81
Protection
If the group is not distributed, only one RPA is specified in this area. You can also tell
which of all of your groups are distributed by navigating to Protection > Manage
Protection, clicking on Consistency Groups in the left pane and looking in the Active RPA
column of the consistency group table. Distributed consistency groups are displayed with
the text (primary) followed by a comma-separated list of numbers indicating the
designated secondary RPAs.
For groups that are not distributed, only one RPA is specified in this column.
82
Protection
4. Open an Internet browser window and connect to an RPA with the address:
http://<RPA IP address>/info
Note
You can connect to the RPA through either an HTTP or an HTTPS connection.
5. When prompted, log in to the RPA using boxmgmt privileges.
6. In the browser, navigate to the following directory:
../info/long_term_stats
7. Download and unzip the long_term_stats.tar.gz file into a folder on your local
machine.
Results
The following table lists the statistics that are output by the
export_consolidated_statistics command. All statistics are valid for the sampled time
interval, that is, the difference between the time from and time to values on that row.
Table 22 Consolidated statistics output
Statistic
Unit of
measure
Description
MB/sec
IOs/sec
Non - initialization
output rate for link
MB/sec
Data synchronization
rate for link
MB/sec
Compression CPU
utilization
Percentage time in
transfer
% of time
83
Protection
84
Statistic
Unit of
measure
Description
Percentage time of
initialization
% of time
Group-Link utilization
Distributor receiver
regulation duration
% of time
Distributor phase 1
thread load
% of time
Distributor phase 1
effective speed
MB/sec
Protection
Statistic
Unit of
measure
Description
value is dependent on the performance of the
journal volumes.
Distributor phase 2
thread load
% of time
Distributor phase 2
effective speed
MB/sec
Fast forward
distribution duration
% of time
Mb/sec
MB/sec
IOs/sec
85
Protection
86
Statistic
Unit of
measure
Description
Non - initialization
output rate for box
(average over all
period)
MB/sec
Data synchronization
rate for box (average
over all period)
MB/sec
Replication process
CPU utilization per
box
% of time
Box utilization
Mb/sec
MB/sec
IOs/sec
Non - initialization
output rate for site
(average over all
period)
MB/sec
Data synchronization
rate for site (average
over all period)
MB/sec
Protection
Statistic
Unit of
measure
Description
from the replication set volumes is transferred. In other
cases, comparison of signatures increases the rate.
msec
Packet loss
% of
packets
The Status tab displays a graphical representation of the copy statuses. The following
information is displayed:
87
Protection
Label
Displays
<Group
Name>
Running on
<RPA>
The group name and the RPA which is handling the group data, both of which can
be modified through the group policies. Group policies on page 63 includes
more information about group policies.
<Copy Name>
at <Cluster
Name>
The relevant copy and RPA cluster names. The copy name can be modified
through the copy policies. Copy policies on page 69 includes more information
about copy policies.
Replication
modes and
states
A dashed green line on top of a solid line means that the system is
replicating synchronously.
Role
The current role of the copy with regards to failover and regulation.
l
Storage
Image
When a copy is selected in the left pane, you can click the buttons at the bottom of the
Status tab to perform the following actions:
Table 24 Status tab options when a group is selected
Button
Description
Test Copy
Displays the Test a Copy on page 128 wizard, enabling you to test the selected
copy of the selected consistency group.
Fail Over
Note
88
Protection
Button
Description
Recover
Production
Displays the Test a Copy and Recover Production on page 132 wizard, enabling
you to test and recover production from the selected copy.
Start
Transfer
Pause
Transfer
Causes the transfer of writes from the production host to the selected copy to
start.
Causes the transfer of writes from the production host to the selected copy to
pause.
Note
Best practice is not to use this command. Use Group policies on page 63 to set
policies for use of bandwidth. Pause transfer may be used when WAN bandwidth
is very limited and you wish to give the largest bandwidth possible to another
consistency group. In that case, you may temporarily pause transfer for lowerpriority consistency groups.
Disable Copy Only displayed if the selected copy is enabled. Disables the selected copy.
Note
Disabling a copy stops all replication, deletes journals, and causes a volume
sweep when the copy is re-enabled.
Enable Copy
Only displayed if the selected copy is disabled. Enables the selected copy.
Note
Remove
Copy
Controlling RTO
Describes how to set and monitor the RPO at a specific copy.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select a copy.
3. In the right pane, click the Copy Policy tab.
4. Control the part of RTO dedicated to data access using the Maximum journal lag
setting in the Journal policies on page 69.
Results
When the system approaches the value of Maximum journal lag, it moves to three-phase
distribution mode.
Monitoring and managing copies
89
Protection
Controlling RPO
Describes how to set and monitor the RTO at a specific copy.
Before you begin
Only relevant in asynchronous replication mode
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, click the Link Policy tab.
a. In the Select link to set policy diagram, select the relevant link.
b. In the Protection Settings, set the RPO policy and click the Apply button.
4. Control the RPO for each consistency group through the RPO setting in the group Link
policies on page 65.
90
Protection
You can also select Dashboard > System Limits, and then click on the Groups tab to
monitor the RPO of all consistency groups in RecoverPoint simultaneously.
In the RecoverPoint CLI, run the get_group_statistics command, and identify the
Lag output in the Link stats area.
91
Protection
Results
The following table describes the information displayed in the Journal tab of each copy.
Table 25 Copy journal tab
Info
Description
Current
Storage
Storage access status. The current condition of a volume at the copy storage can
be:
Journal Lag
Compression
Ratio
Amount of data (represented by snapshots) in the copy journal that has not yet
been distributed to the copy storage. The maximum journal lag setting defines
the current recovery point objective. In the event of a disaster, this is the
maximum amount of data loss that may be incurred.
Note
92
Compression is not relevant for the production journal (since the production
journal does not contain snapshots).
Compression impacts the CPU resources of the target RPA of the consistency
group, and can impact that RPAs ability to sustain its write-load. If the target
Protection
Info
Description
RPA of the consistency group for which you want to enable this option is also
transferring the data of other consistency groups across the WAN, note that
enabling this setting will affect the RPAs transfer rate. See the EMC
RecoverPoint Release Notes for throughput limitations.
Required
Protection
Window
Default = disabled
Current
Protection
Window
Indicates how far the copy journal can be rolled back. If the Required Protection
Window is defined, the Current Protection Window will be in one of the following
statuses (indicated in parentheses after the Current Protection Window):
Indicates how far in time the copy image can be rolled back.
Sufficient: Image can be rolled back far enough to meet the Required
Protection Window
Insufficient: Image cannot be rolled back far enough to meet the Required
Protection Window
Extending: Replication has not been running long enough to be roll backed
as far as the Required Protection Window.
If the Required Protection Window is not defined, the status will be N/A.
Predicted
Protection
Window
Systems prediction of the eventual size of the protection window. Note that
there is no guarantee on how long it will take to reach the predicted protection
window, and no guarantee that it will ever be reached (conditions may change
before it is reached).
If the Required Protection Window is defined, the Predicted Protection Window is
in one of the following statuses:
l
Note
93
Protection
Info
Description
Consolidation
Type
Consolidation
Range
Progress
Stop
The image list in the copy Journal tab displays the following information:
Info
Description
Point in Time
Size
Size of snapshot.
Bookmark
Consistency
94
Protection
Info
Description
and can be manually marked by the user using the Snapshot Policy button in
the copy Journal tab.
Note
Marking a snapshot as application-consistent does not create an applicationconsistent snapshot, it only tags the snapshot as application-consistent.
Snapshots marked as application-consistent have a higher probability of being
included in the snapshots displayed in the image list. If snapshot consolidation
is enabled, consider setting a Consolidation Policy of Never Consolidate for
snapshots that are marked as application-consistent.
Consolidation
Policy
6. In five-phase distribution mode, note the process steps labeled as Distributor phase
1 and Distributor phase 2, and note their performance statistics.
95
Protection
7. In three-phase distribution mode, note the process labeled Fast forward distribution
duration, and note the statistics.
The total size of all snapshots between the specified start and end times must be at
least 1 GB.
Snapshots that account for 90% of the consolidation period must be available in
journal.
For example, for daily consolidation to take place, the starting and ending snapshots
must be at least 22 hours apart. Likewise, automatic consolidation will not take place
if the snapshots in the journal exceed 110% of the consolidation period. For
example, daily consolidation will not take place if the starting and ending snapshots
are more than 26 hours apart.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group and select a copy.
3. In the right pane, click the Copy Policy tab.
4. Select the Enable RecoverPoint Snapshot Consolidation checkbox to begin
consolidating the snapshots in your copy journal according to the default settings, or
adjust the settings to your specific requirements.
Results
Automatic snapshot consolidation begins according to the values set in the Copy Policy
tab, provided the system is in the distribution phase and initialization is over.
After you finish
To display the consolidation progress and space saved by the process:
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group and select a copy.
3. In the right pane, click the Journal tab.
96
Changing the periodic Interval of the Snap-based replication policy in the group
Table 16 on page 65 automatically updates the XtremIO detailed snapshot
consolidation policies.
Protection
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group and select a copy.
3. In the right pane, click the Copy Policy tab.
4. Change the XtremIO copy Table 18 on page 69:
(Advanced users only) Click the Edit Detailed Consolidation Settings link.
In the Edit Detailed Consolidation Settings dialog box, specify one to three
consolidation policies.
The system uses the entered values as guidelines. The actual number of
snapshots per timeframe is displayed beside each policy.
Note
For the consolidation policy values to be valid, the first consolidation policy in the
list must be of the shortest duration and the last policy in the list must be of the
longest duration. The first average snapshot frequency in the list must be higher
than the last.
97
Protection
Results
All of the group protection policies can be modified through the Group Policy tab. Group
policies on page 63 includes more information about group protection policies.
98
Protection
Results
All of the link protection policies on page 65 can be modified through the Link Policy tab.
If you have created policy templates on page 52, use the Select Template drop-down to
select a policy template. Click Load to load the template settings into the dialog box.
NOTICE
After loading a policy template, modify the link policies on page 65 as required, and click
Apply to use the settings. The settings are not applied until the Apply button is clicked.
Remove a group
NOTICE
Remove one group by selecting the consistency group in the left pane, clicking the
Status tab, and clicking Remove Group.
Remove multiple groups by clicking Consistency Groups in the left pane, selecting
one or more groups in the right pane, and clicking Remove Group.
The Cancel button closes the wizard and disables image access without creating the
copy.
The Finish button closes the wizard, creates the copy, and optionally, starts
replication to the new copy.
NOTICE
VPLEX Metro users can also use this procedure to turn a non-MetroPoint group into a
MetroPoint group.
Modifying consistency groups
99
Protection
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select a consistency group.
3. In the right pane, select the Status tab, and click Add Copy. The Add a Copy wizard is
displayed.
4. In the Add a Copy screen:
Note
This screen changes depending on whether or not VPLEX distributed volumes have
been mapped to RPA cluster at the production, and the group contains no remote
copies, or one remote copy.
l
If the there are VPLEX distributed volumes mapped to the RPA cluster at the
production, and the group contains no remote copies, or one remote copy, the Add
a Copy screen will contain two options for adding a copy.
If you are not a VPLEX Metro user or you do not want to turn a non-MetroPoint
group into a MetroPoint group, skip to the next bullet. If you are a VPLEX Metro
user, and want to turn a non-MetroPoint group into a MetroPoint group:
a. Select the Add Standby > Production Copy radio button.
b. Enter a name for the copy in the Standby production copy name field.
c. In the volume list, mark the checkboxes of each journal volume that you want
to use in your standby production journal.
Use the toolbar options at the top-right corner of the screen to help you identify
the required volumes in the volume list. For best performance, select volumes
that are identical in size. If identically sized volumes are not available, select
volumes that are similar in size.
These are the copy journal volumes for the standby copy, not the copy volumes.
d. Optionally, click Modify Policy to define the Journal policies on page 69 now, or
skip this step and define the policies later when you Modify a copys protection
policies on page 112.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is
a specific business need to set other policies.
100
Protection
If you want to change the protection settings using Policy Templates on page
52, use the Select Template drop-down to select one of your templates. Click
Load to load the settings in the template and click OK to apply the settings.
Note
This link is only enabled after volumes are selected in the volume list.
e. Click Next Display Copy Summary, and continue to Step 5 on page 213 on page
105.
l
a. Define the copy name, the RPA cluster that will manage the copy volumes, and
the replication mode.
b. For each production volume, click the Select volume link to add a volume to
the copy. The selected volume is the volume that the production volume is
replicated to.
Note
101
Protection
Note
In VPLEX splitter environments, the VPLEX consistency group name will only be
displayed in the VPLEX Group column of the volume list if you Attach volumes
to the splitter on page 164 for the VPLEX splitter (including certificate). After
you enter VPLEX credentials, you will not be able to select VPLEX volumes and
non-VPLEX volumes in the same consistency group copy. It is recommended
that all volumes in a VPLEX consistency group be configured in a single
consistency group copy, and all volumes in a non-VPLEX consistency group be
configured in another consistency group copy.
In RecoverPoint/CL and RecoverPoint/EX, only the volumes that are mapped
and zoned to the RPA cluster are displayed in the available volumes list. In
RecoverPoint/SE, all of the volumes of the supported VNX Series array are
displayed in the available volumes list. See the appropriate technical notes for
your splitter for more information.
Use the toolbar options at the top-right corner of the screen to help you identify
the required volumes in the volume list. For best performance during failover,
select volumes that are the same size as the production volume. If volumes of
the same size are not available, select volumes that are as similar in size as
possible.
NOTICE
You cannot proceed to the next step until the replication sets icon under the
volume list shows a green check mark to indicate that the number of
replication sets is equal to the number of production volumes.
a. Optionally, click Modify Policy to define the Copy policies on page 69 and Link
policies on page 65 now.
102
Protection
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is a
specific business need to set other policies.
If you want to change the protection settings using Policy Templates on page 52, in
the Link tab, use the Select Template drop-down to select one of your templates.
Click Load to load the settings in the template and click OK to apply the settings.
b. To continue configuring the group, click Next Define Copy Journal.
5. In the Define Copy Journal step:
If the volume that you specified in the last step is not on a Unity/VNXe/VNX array, skip
to step a on page 104
l
If the volume that you specified in the last step resides on a Unity/VNXe/VNX array
that has already been registered in RecoverPoint, and a resource pool was already
registered for the same Unity/VNXe/VNX array, the Journal Provisioning Method
screen is displayed.
Description
Journal size
Predicted
incoming
write-rate
Select this option and enter a value for predicted incoming writerate and required protection window to have RecoverPoint/SE
calculate the required journal size based on your consistency
groups predicted write-rate and a required protection window.
As you change this value, the journal size that is required to sustain the
entered values for predicted incoming write-rate and the required
protection window is dynamically updated in the Calculated journal
size field.
103
Protection
Option
Description
Required
protection
window
Note
When you are done configuring your journal settings, click Next Display Copy
Summary.
l
For applications running on a host cluster, the journal volumes must not be
resources of the host cluster.
In the volume list:
a. Select the volumes to add to the journal.
On XtremIO arrays, the journal does not need to be larger than 10 GB for nondistributed consistency groups, 40 GB for distributed consistency groups.
Use the toolbar options at the top-right corner of the screen to help you identify
the required volumes in the volume list. For best performance, select volumes
that are identical in size. If identically sized volumes are not available, select
volumes that are similar in size.
b. Optionally, click Modify Policy to define the Journal policies on page 69 now.
The policy settings are optional. The default values provide a practical
configuration. It is recommended to accept the default settings unless there is
a specific business need to set other policies.
104
Protection
If you want to change the protection settings using Policy Templates on page
52, use the Select Template drop-down to select one of your templates. Click
Load to load the settings in the template and click OK to apply the settings.
c. Click Next Display Copy Summary.
6. In the Copy Summary screen:
a. Select a copy to display its volume details and ensure the copy summary reflects
your anticipated copy configuration:
In RecoverPoint/SE:
l
If you selected to Automatically provision journal volumes based on a predefined Journal Size, the Journal Size is displayed at the bottom of the Copy
Summary screen.
b. Use the following options to create the copy, and optionally, start replication.
Table 28 Options
Action
Description
Start
replication to
copy when I
click 'Finish'
Before you start transfer to any copy, ensure that the copy volumes are
unmounted from any hosts and any volume groups are deported from
the logical volume manager.
Finish
Creates the copy, applies all of the specified settings, and starts a firsttime initialization process to synchronize the production volumes to the
copy volumes.
Before you click Finish, note the following:
Modifying consistency groups
105
Protection
Action
Description
l
If you want to turn a MetroPoint group into a non-MetroPoint group, select the standby
production copy.
3. In the right pane; select the Status tab, click Remove Copy.
The journal of all copies of the consistency group will be lost if all RPA clusters in your
system are not running RecoverPoint 4.4 or later.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
3. In the right pane; select the Replication Sets tab, and click Add Replication Sets.
106
Protection
The Add Replication Sets wizard opens and the Select Production Volumes screen is
displayed.
4. In the Select Production Volumes screen:
a. Select your production volumes in the volume list.
Note
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array.
Use the toolbar options at the top-right corner of the screen to help you identify
the volumes.
The VPLEX consistency group name will only be displayed in the VPLEX Group
column if you have entered the VPLEX storage credentials (including certificate).
When you enter VPLEX credentials, you will not be able to select VPLEX volumes
and non-VPLEX volumes in the same RecoverPoint consistency group copy. It is
Modifying consistency groups
107
Protection
If one volume at a copy is on an XtremIO array, all other XtremIO volumes at that
copy must be on the same array.
Use the toolbar options at the top-right corner of the screen to help you identify
the required volumes in the volume list.
For best performance during failover, select volumes that are the same size as the
production volume. If volumes of the same size are not available, select volumes
that are as similar in size as possible.
108
Protection
You cannot go on to the next step until the Replication sets icon under the volume
list shows a green check mark to indicate that the number of Replication sets is
equal to the number of production volumes.
b. When you are done selecting the volumes at each copy, click Next Review
Replication Sets.
6. In the Review Replication Sets screen:
a. Select a row in the replication sets table in the top section of the screen to display
the associated volume information in the bottom section.
b. Click on the replication set name to open the Edit Replication Set dialog box.
109
Protection
When you add a new replication set to an existing consistency group, RecoverPoint
ensures consistency between the new copy volume(s) and their production
source(s) by performing a volume sweep on all of the volumes in the new
replication set. Selecting the Attach as Clean checkbox overrides the default
synchronization process by informing the system that the new copy volumes are
known to be an exact image of their corresponding production volumes. If Attach
as Clean is checked, and the new copy volumes are inconsistent with their
corresponding production volumes, they will remain inconsistent. To ensure
consistency, best practice is not to use this option and allow the default
RecoverPoint synchronization process to ensure consistency between the new
copy volumes and the production.
7. Click Finish.
Results
All of the consistency group volumes undergo a short pause in transfer and a short
initialization, and a volume sweep occurs on the newly added volumes.
Enabled consistency groups must contain at least one replication set. If you want to
remove all of the replication sets in the group, click the Status tab and then click
Disable Group.
Procedure
1. Select Protection > Manage Protection.
2. Select the consistency group.
3. Select the Replication Sets tab.
4. Select one or more replication sets to remove.
Note
Clicking on a cell in any of the copy columns displays the relevant volume information
in the bottom pane.
5. Click Remove Replication Set.
Results
All of the consistency group volumes undergo a short pause in transfer and a short
initialization.
Protection
Before you start transfer to any copy, ensure that the copy volumes are unmounted
from any hosts and any volume groups are deported from the logical volume
manager.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select the consistency group.
3. In the right pane; select the Status tab, click Start Transfer, and click yes in the
confirmation dialog box.
Results
Transfer starts between the production and all copies of the consistency group.
Disable groups
Note
Disabling a group stops replication, deletes all copy journals, and causes a full sweep on
all copies in the group when the group is re-enabled.
Procedure
1. Select Protection > Manage Protection.
2. Disable the group(s):
l
To disable one group, select the group in the left pane, click the Status tab, and
click Disable Group.
To disable multiple groups, click Consistency Groups in the left pane, select one or
more groups in the right pane, and click Disable Group.
Enable groups
Before you begin
l
Before you start transfer to any copy, ensure that the copy volumes are unmounted
from any hosts and any volume groups are deported from the logical volume
manager.
Procedure
1. Select Protection > Manage Protection.
2. Enable the group(s):
Modifying consistency groups
111
Protection
To enable one group, select the group in the left pane, click the Status tab, and
click Enable Group.
To enable multiple groups, click Consistency Groups in the left pane, select one or
more groups in the right pane, and click Enable Group.
NOTICE
Modifying copies
Use the Manage Protection screen to:
l
4. Modify the Copy policies on page 69 and the copy Journal policies on page 69 as
required.
5. If you have created Policy Templates on page 52, use the Select Template drop-down
to select one of them, and click Load to load their settings into the dialog box.
6. Click Apply to use the settings.
112
Protection
Note
The settings are not applied until the Apply button is clicked.
Ensure that the copy volumes are unmounted from any hosts and any volume groups
are deported from the logical volume manager.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Start Transfer, and click yes in the
confirmation dialog box.
Disable a copy
Before you begin
l
Disabling a copy stops replication, deletes the copy journal, and causes a volume
sweep when the copy is re-enabled.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Disable Copy, and click yes in the
confirmation dialog box.
Modifying copies
113
Protection
Enable a copy
Before you begin
l
Before you start transfer to any copy, ensure that the copy volumes are unmounted
from any hosts and any volume groups are deported from the logical volume
manager.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand a consistency group, and select the copy.
3. In the right pane; select the Status tab, click Enable Copy, and click yes in the
confirmation dialog box.
NOTICE
Modifying links
To modify the protection policy of the links between existing consistency group copies:
Procedure
1. Select Protection > Manage Protection.
2. Select the consistency group in the left pane
3. In the right pane, click the Link Policy tab.
Results
All of the Link policies on page 65 can be modified through the Link Policy tab.
If you have created Policy Templates on page 52, select a link in the diagram and use the
Select Template drop-down to select a policy template. Click Load to load the template
settings into the Link Policy dialog box.
114
Protection
NOTICE
After loading a policy template, modify the Link policies on page 65 as required, and click
Apply to use the settings. The settings are not applied until the Apply button is clicked.
115
Protection
a. Click the link next to the RPA cluster containing the volume you want to replace.
In the Select Volume dialog box, note the production volume specified in the
Production volume area at the top of the screen.
b. Select the volume to which you want to replicate the specified production volume.
c. Click OK.
Results
Data transfer is briefly paused for the group. A volume sweep occurs on any added
volume(s) and a short initialization occurs on all other volumes in the group, when data
transfer re-starts.
116
If you resize a production volume without resizing all of the copy volumes, transfer is
paused until the copy volumes are resized.
Protection
If you resize a copy volume without resizing its production volume, failover and
production recovery will not be possible until the production volume is resized.
To minimize the time that transfer is paused, best practice is to resize the copy
volumes first, and then the production volumes.
In Unity/VNXe/VNX environments:
l
Procedure
1. Resize the LUNs on storage.
l
It can take up to half an hour for RecoverPoint to display the new LUN sizes. To update
the display immediately, run the rescan_san CLI command.
l
117
Protection
It may take a few minutes for RecoverPoint to display the new volume sizes.
l
Resizing volumes
Before you begin
This procedure is not relevant for XtremIO.
Procedure
1. In RecoverPoint:
a. In Unity/VNXe/VNX only: Detach volumes from the splitter on page 165.
b. Remove replication sets on page 110.
2. On the storage, resize all LUNs in the replication set.
3. In RecoverPoint:
a. Create a new replication set containing the resized LUNs according to Add
replication sets on page 106.
A short initialization process starts on all volumes in the group.
b. In Unity/VNXe/VNX only: Attach the volumes to the splitter according to Attach
volumes to the splitter on page 164.
Results
A volume sweep starts on the replication set.
Modifying journals
There are two ways to change the storage capacity of an existing journal:
l
Add or edit journal volumes on page 118; this process does not trigger a full sweep
synchronization, nor does it erase all history in the existing journal. After this
procedure, the copy can still be rolled back to a previous point-in-time.
Change the size of a journal LUN on storage on page 119; this process does trigger a
full sweep synchronization, and it does erase all history in the existing journal. After
this procedure, the copy cannot be rolled back to a previous point-in-time.
118
In RecoverPoint/CL and RecoverPoint/EX only: Only the volumes that are exposed to
the RPA cluster are displayed in the available volumes list. If the required volumes
are not in the available volumes list, mask the LUNs to RecoverPoint WWNs, and click
the Rescan button to update the list of available volumes.
In RecoverPoint/SE, all of the volumes of the supported array are displayed in the
available volumes list.
For best performance, select volumes that are identical in size. If identically sized
volumes are not available, select volumes that are similar in size.
Protection
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, expand the consistency group, and select a copy.
3. In the right pane:
a. Select the Journal tab.
b. Click Edit Journal Volumes. The Edit Journal Volumes dialog box is displayed.
c. Mark the checkboxes of the volumes that you want to add to the journal.
Clear the checkboxes of the volumes that you want to remove from the journal.
Multiple volumes can be selected.
d. Click OK.
After you finish
If you performed this procedure to enlarge the journal capacity after distributing the
writes of this consistency group across multiple RPAs, disable and then re-enable this
group to trigger a full sweep.
Modifying journals
119
Protection
Note
This ensures that all writes up until the latest image are transferred from the copy
journal to the copy storage, and only the host writes from that point forward will
need to be synchronized at the end of this procedure.
2. In RecoverPoint, disable the copy and remove the journal volume(s). Select Protection
> Manage Protection:
a. In the left pane, expand the group that the journal volume belongs to and select
the copy.
b. In the right pane; select the Journal tab, and click Edit Journal > Volumes. The Edit
Journal Volumes dialog box is displayed.
c. Clear the checkbox of the journal volume whose size you want to change and click
OK. The journal volume is removed from the RecoverPoint system.
3. At the copys SAN, dedicate more storage resources to the required LUN(s).
4. In RecoverPoint, click Edit Journal Volumes .
The RecoverPoint SAN discovery utility automatically detects the change in the
physical size of the volume.
5. Select the resized LUN(s).
6. Click the OK button to apply the changes and exit the dialog box.
7. In the right pane, select the Status tab.
8. Select Recovery > Manage Recovery, and select Finish Testing in the Select Next
Action combo box of the copy containing the expanded journal volume(s).
Results
Data transfer is briefly paused for the group, and a short initialization may occur, but only
the writes that occurred after image access was enabled to the copy will be synchronized.
Modifying snapshots
All of the points in time (snapshots) created by RecoverPoint are crash-consistent by
default. You can set or modify the policies of one or more snapshots by using the
following procedures:
l
120
Protection
Create a bookmark and define snapshot policies for one group on page 122
Note
Create a bookmark and define snapshot policies across multiple groups on page 123
Use KVSS to Create and mark an application-consistent point in time on page 124.
Table 29 Snapshot policies
Setting
Description
Bookmark
Mark as
The two possible values for this field are Application-Consistentand CrashConsistent. All snapshots are Crash-Consistent by default. Select ApplicationConsistentfrom the drop down if the selected snapshot is known to be
application-consistent.
Selecting Application-Consistent does not create an application-consistent
snapshot, it only tags the snapshot as application-consistent.
Note
Define a
Consolidation
Policy for this
Snapshot
Note
Modifying snapshots
121
Protection
Setting
Description
Note
4. In the Snapshot Policy dialog box, enter or modify any of the snapshot policies on
page 121 and click OK.
122
Protection
All RecoverPoint snapshots are crash-consistent. Use KVSS to Create and mark an
application-consistent point in time on page 124.
You can only create a bookmark for a consistency group that is enabled and actively
transferring.
When creating a bookmark for multiple groups in parallel, the system creates a
bookmark with the same name and snapshot policies at a similar point in time on
each of the relevant consistency group volumes.
Note
This procedure does not create parallel bookmarks. To create parallel (consistent)
bookmarks at pre-defined intervals, create a group set on page 57.
Procedure
1. Select Protection > Manage Protection.
2. In the left pane, select Consistency Groups.
3. In the right pane; select two or more consistency groups, click Create Bookmark.
Modifying snapshots
123
Protection
124
You can use the vssadmin list writers command to obtain a list of registered
writers on the host machine.
You can use the kvss.exe list command to display the components of each of
the writers found using the vssadmin list writers command.
Protection
You can run the kvss.exe set_credentials command once per Windows user
to define the ip, user and password. After doing so, you will not need to enter these
values again.
Multiple writers and groups can be entered simultaneously if they are separated by a
space.
To use KVSS in a Microsoft Cluster Server environment with Symmetrix DMX storage, the
SPC-2 flag must be enabled on the Symmetrix ports.The syntax is as follows:
kvss.exe bookmark
bookmark=<bookmark_name>
writers=<writer_name> <writer_name>
[groups=<group_name> <group_name>]
[consolidation_policy=never|survive_daily|survive_weekly|
survive_monthy|always]
[type=[FULL|COPY]]
[ip=<RecoverPoint_cluster_management_ip_address>]
[user=<RecoverPoint_username>]
[password=<RecoverPoint password>]
Note
consolidation_policy = consolidation policy to set for this snapshot. Valid values are:
n
type =The shadow copy type: either FULL or COPY. This setting is optional. The default
is COPY. The settings full and copy are implemented by the writer application.
Generally, when type = full,backup logs are truncated; when type = copy, backup logs
are not truncated.
Modifying snapshots
125
Protection
NOTICE
You can use the kvss.exe set_credentials command to define the IP address,
user, and password one time per Windows user, instead of entering these values each
time you create a bookmark.
For example, to create a bookmark for a Microsoft Exchange application for the first time:
kvss.exe set_credentials
ip=10.10.0.145
user=admin
password=admin
kvss.exe bookmark
writers="Microsoft Exchange Writer"
groups="exchange\comp1" exchange\comp2
bookmark="exchange hourly snapshot"
consolidation_policy=survive_daily
To create a bookmark every subsequent time for a Microsoft Exchange application after
defining the ip, user, and password through the kvss.exe set_credentials
command:
kvss.exe bookmark
writers="Microsoft Exchange Writer"
groups="exchange\comp1" exchange\comp2
bookmark="exchange hourly snapshot"
consolidation_policy=survive_daily
126
CHAPTER 4
Recovery
This section describes how to test copies, recover from disasters, and migrate to a
different storage system.
l
l
l
l
l
Recovery
127
Recovery
RecoverPoint Recovery
In Unisphere for RecoverPoint, data testing and recovery is guided by wizards, and
performed through the Recovery menu.
NOTICE
Test a Copy
Use the Test a Copy wizard to briefly access and test your copy images.
Recovery
If you selected a consistency group, select a non-production copy from the list of
copies or the copy diagram.
Selecting an image
Procedure
1. In the Select an Image screen, select the copy image that you want to access.
To test the image, you may want to start with the last image known to be valid. To
analyze data, you generally want the latest image.
129
Recovery
2. Unless your copy is on an XtremIO array, you will have to select the required Image
access mode. If your copy is on an XtremIO array, skip this step.
Virtual Access without Roll image in background is preferred. However, if you need to
test images for a longer period of time or need maximum performance while testing,
select Virtual Access and check the Roll to image in background checkbox, or select
Logged Access.
3. Mount the copy volumes that you want to access and import any volume groups.
4. Click Next Test the Image on page 130 to start enabling image access to the copy
volumes.
After you finish
130
Recovery
If any of the groups or copies in a group set are not legal for the requested operation, they
are not displayed in the Relevant copies at target cluster table.
Procedure
1. Use the Test the Image screen to monitor your testing activity.
2. Before you begin testing, wait for image access to be enabled.
If you are accessing the image in logged access mode, wait for the system to roll to
the selected image.
Note the status of the Image access log capacity progress bar. It indicates the amount
of time that you have left to access the image before writes to the copy are blocked
and you will have to add journal volumes, undo writes, enable direct access or disable
image access.
3. Test the copy image, to ensure its suitability to your purposes.
While testing the copy image, you can click Roll to Image to physically roll to the
desired image (in Virtual Access mode), Enable Direct Access to bypass the image
access log and write directly to the copy storage, Undo Writes to undo all writes to the
copy volumes, Cancel to disable image access, or Save & Close to exit the wizard
without disabling image access and display the Manage Recovery on page 139
screen.
Note
l
If you Enable Direct Access you cannot roll back to an earlier image of the
accessed copy if you discover corrupted data. Moreover, in the event of a disaster
at the production during testing, you will not be able to remove any new data
written to the copy during testing unless the group contains another nonproduction copy.
Before you Undo Writes, at the copy host, shut down all applications accessing the
group volumes, unmount all copy volumes, and deport any volume groups. After
the writes are undone, at the copy host, mount the copy volumes and import
volume groups to continue testing.
4. When you are done testing, click Cancel to disable image access.
131
Recovery
5. At the copy host, stop all applications and unmount the copy volumes. Deport any
copy volume groups.
132
If you selected a consistency group, select a non-production copy from the list of
copies or the copy diagram.
If you selected a group set, select a target RPA cluster from the list.
Recovery
Selecting an image
Procedure
1. In the Select an Image screen, select the image that you want to recover production
from.
To restore your production from a copy, you generally want the most recent copy
image that you know to be valid. For example, if you are using Microsoft Volume
Shadow Copy Service, you probably want to select the most recent shadow copy.
133
Recovery
Starting recovery
The Start Recovery screen differs depending upon whether you selected a consistency
group or a group set.
If any of the groups or copies in a group set are not legal for the requested operation, they
are not displayed in the Relevant copies at target cluster table.
Procedure
1. Use the Start Recovery screen to monitor your copy testing, and start recovery.
2. Wait for image access to be enabled.
Note the status of the Image access log capacity progress bar. It indicates the amount
of time that you have left to access the image before writes to the copy are blocked
and you will have to add journal volumes, undo writes, enable direct access, or
disable image access.
3. Test the copy image, to ensure its suitability to your purposes.
134
Recovery
Note the status of the Image access log capacity progress bar. It indicates the amount
of time that you have left before writes to the copy are blocked and you will have to
add journal volumes, undo writes, enable direct access or disable image access.
While testing the copy image, click Undo Writes to undo all writes to the copy volumes
without disabling image access, Cancel to disable image access, or Save & Close to
exit the wizard without disabling image access.
Note
Before you click Undo Writes, at the copy host, shut down all applications accessing
the copy volumes, unmount all copy volumes, and deport any volume groups. After
the writes are undone, mount the copy volumes and import any volume groups to
continue testing.
4. Before starting recovery, if necessary, click Undo Writes to remove any writes to the
copy before production recovery. Then, at the copy host, unmount the copy volumes
and deport any volume groups.
Note
If you do not Undo Writes now, any writes made to the copy while image access was
enabled will be transferred to the production when you click Finish. Before you click
Undo Writes, at the copy host, shut down all applications accessing the copy
volumes, unmount all copy volumes, and deport any volume groups. After the writes
are undone, mount the copy volumes and import any volume groups to start
production recovery.
5. Click Finish to start production recovery and display the Manage Recovery on page
139 screen.
Note
The marking information in the production journal is deleted (not relevant in XtremIO).
After production recovery is complete, the group undergoes a short initialization to
synchronize the new production data at the copies.
135
Recovery
You can only fail over temporarily if you have more than one non-production copy in
the group.
If your group(s) only contain one non-production copy, the failover will be permanent.
Before you begin a permanent failover, shut down any production host activities on
Windows Server platforms. To ensure an up-to-date image of the file system, flush all
file systems that reside on the production volumes. Some applications, such as
Exchange, have their own cache, which should be flushed as well. Close all
applications that are using the consistency group volumes at the production site and
place each drive volume used by the consistency group into an offline state.
Procedure
1. Select Recovery > Test a Copy and Fail Over.
2. In the Select a Copy screen, select either a consistency group or a group set.
136
If you selected a consistency group, select a non-production copy from the list of
copies or the copy diagram.
If you selected a group set, select a target RPA cluster from the list.
Recovery
Selecting an image
Procedure
1. In the Select an Image screen, select the image to fail over to.
To permanently fail over to a copy, you generally want the most recent copy image that
you know to be valid, that was created after placing all consistency group drives into
an offline state at the production. For example, if you are using Microsoft Volume
Shadow Copy Service, you probably want to select the most recent shadow copy.
2. Select your preferred image access mode.
3. Mount the copy volumes that you want to access and import any volume groups.
4. Click Next Start Failover on page 138.
RecoverPoint starts enabling access to the specified copy image.
137
Recovery
Starting failover
The Start Failover screen differs depending upon whether you selected a consistency
group or a group set.
If any of the groups or copies in a group set are not legal for the requested operation, they
will not be displayed in the Relevant copies at target cluster table.
Procedure
1. Use the Start Failover screen monitor your testing activity, and start failover.
2. Wait for image access to be enabled.
Note the status of the Image access log capacity progress bar. It indicates the amount
of time that you have left to access the image before writes to the copy are blocked
and you will have to add journal volumes, undo writes, enable direct access or disable
image access.
3. If you are only failing over temporarily, and planning to fail back, skip this step.
138
Recovery
If you are failing over permanently; resume production disk activities by placing each
production drive volume used by the consistency group into an online state now.
4. At the copy host, mount the copy volumes that you want to access and import any
volume groups.
5. Test the copy image, to ensure its suitability to your purposes.
While testing the copy image, click Undo Writes to undo all writes to the copy volumes
without disabling image access, Cancel to disable image access, or Save & Close to
exit the wizard without disabling image access and display the Manage Recovery on
page 139 screen.
Note
Before you click Undo Writes, at the copy host, shut down all applications accessing
the group volumes, unmount all group volumes, and deport any volume groups. After
the writes are undone, mount the copy volumes and import any volume groups to
continue testing.
6. When testing is complete and you are ready to fail over, if your group only contains
one non-production copy, the failover will be permanent.
At the copy host, unmount the copy volumes and deport any volume groups now.
7. Click Finish.
l
If there is only one non-production copy in your group(s), the marking information
in the production journal is deleted, the copy journal is deleted, and the group
undergoes a full sweep before normal replication is resumed.
If there is more than one non-production copy in your group(s), the Manage
Recovery on page 139 screen is displayed. You can repair the production while
your applications and business operations continue at the copy. When you are
done, use the Manage Recovery on page 139 screen to:
n
Manage Recovery
Use Manage Recovery to monitor and manage all of the accessed copies and recovery
activities currently occurring in the system.
The Manage Recovery screen displays an activity bar for each copy (or copies, in the case
of a group set) on which an image has been accessed by RecoverPoint. In each copy
Manage Recovery
139
Recovery
activity bar, click the Show Activity Diagram link to monitor the activity progress and use
the Select Next Action drop-down to complete the activity.
Note
If an action that is part of a recovery activity fails for one or more of the groups in a group
set, you may want to manually perform the action for each group on which the action
failed in order to bring all of the group set's groups to the same recovery state.
Testing a copy
While Testing a copy, click Select Next Action to:
Continue Testing
Opens the Test a Copy wizard to the Test the Image screen on page 130.
Finish Testing
Stops testing and disables image access to the relevant group or group set copies.
Failing over
While Failing Over, click Select Next Action to:
Fail Back to Production
When repairs at the production site are complete, resumes production activities at
the original production site.
Opens the Failover wizard to the Start Failover screen on page 138. In the Start
Failover screen, click Fail Over to start failing back.
Note
140
Recovery
Before selecting this option, at the relevant copy host(s), close any applications
accessing the copy(s), unmount the copy volumes and deport any volume groups.
If the group contained more than one non-production copy, the Set Production
dialog box is displayed, prompting you to decide what you want to do with any target
copies of the new production after failover. If you are failing over a group set
containing groups with more than one non-production copy, the Set Production
dialog box is not displayed. In this case, before setting a copy as the new
production, you will need to manually configure the links on page 98 between the
new production and all of the new target copies.
If you want to use a copy, configure a new link for it and define a link policy on page
65 (not necessary for Data Domain copies). Removing a copy deletes the copy data
and settings from storage. Disabling a copy retains the copy data and settings on
storage.
Note
The journal of the new production is deleted. Replication starts from the new
production to the new copies.
Back to Wizard
Opens the Failover wizard to the Start Failover screen on page 138.
Failing over
141
Recovery
Recovering production
While recovering production only Back to Wizard is available. Click Back to Wizard to open
the Recover Production wizard to the Start Recovery screen on page 134. In the Start
Recovery screen, click Recover Production to start the recovery activity.
142
CHAPTER 5
RPA Clusters
This section describes the RPA Clusters menu and how to use it to manage and monitor
replication in RecoverPoint.
l
l
l
l
l
l
RPA Clusters
143
RPA Clusters
RecoverPoint clusters
Monitoring or administration of components in a RecoverPoint system that are managed
by RPA clusters is performed through the RPA Clusters interface. The information for each
RPA cluster is displayed in a separate tab of the interface.
Option
When to use
General
Cluster Info
To display the specified RPA cluster graphically as part of a site map and view
general cluster information, or to display any alerts that may have been logged
for any of the physical components of your RecoverPoint system, at the selected
RPA cluster.
Storage
To register arrays, vCenter Servers, and resource pools and manage their
registration in the RecoverPoint system.
Splitters
Note
RPAs
vCenter
Servers
To display the RPA table containing all RPAs in the selected RPA cluster, and the
status and properties of each.
Note
144
RPA Clusters
The General Cluster Info section contains a Cluster Diagram and a Cluster Details section
that allow you to easily monitor and analyze the current state of the RPA cluster. The
cluster diagram contains all of the major components of the RecoverPoint system (host,
storage, and RPAs) and the connectivity between them and the RPA cluster. An icon is
displayed on any system component for which system alerts on page 25 have been
registered.
The following information is displayed in the details section below the cluster diagram:
Information
Description
RecoverPoint
Version
The version of the RecoverPoint software that is currently installed on the RPA
cluster.
If the system is in maintenance mode, the RecoverPoint version will display N/A
System is in maintenance mode.
145
RPA Clusters
Information
Description
Internal RPA
Cluster Name
The internal system name given to RPA clusters, and used in upgrade scenarios.
Management
IPv4
The IP address assigned to the LAN interface of the RPA cluster in order to define
the management interface network, in IPv4 format.
Note
Use this IP to connect to the RPA in the RPA cluster that is running the cluster
control, in IPv4 format.
Management
IPv6
The IP address assigned to the LAN interface of the RPA cluster in order to define
the management interface network, in IPv6 format.
Note
Use this IP to connect to the RPA in the RPA cluster that is running the cluster
control, in IPv6 format.
Software
Serial ID
Number of
RPAs
RPA Type
The type of the RPA cluster. Valid values are Physical or Virtual.
Maintenance
Mode
146
Minor Upgrade
Major Upgrade
RPA Clusters
Information
Time Zone
Description
l
Hardware Replacement
Repository Change
RP/SE Conversion
System Modification
Unknown
Storage
Use the RPA Clusters > RPA-Cluster-Name tab > Storage link to enable RecoverPoint
storage awareness by registering new arrays, vCenter Servers and resource pools or
manage existing registered arrays, vCenter Servers, and resource pools.
Note
In RecoverPoint, Data Domain block services for ProtectPoint pools are referred to as
resource pools
Storage
147
RPA Clusters
Results
The Registered Storage table is displayed. The Registered Storage table contains the list
of all of the storage currently registered at the selected RPA cluster with the following
storage-specific information:
Table 32 Storage information
148
Information
Description
Name
Serial
Number
Type
VNX
ScaleIO
VPLEX
RPA Clusters
Information
Description
l
vCenter Server
XtremIO
Data Domain
IP
The IP address of the array or vCenter Server management interface. In the case
of ScaleIO storage, it may be a list of IP addresses.
Version
Splitter
Connectivity Whether or not there is connectivity between the storage and the RPA cluster.
Status
Connectivity Whether the connection between the storage and the RPA cluster is via Fibre
Channel (FC) or IP.
Type
Register storage
Before you begin
Note
This procedure is not relevant to Unity or VNXe, which registers itself with RecoverPoint
automatically.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Storage.
Note
You can also register vCenter Servers by selecting RPA Clusters > <RPA-Cluster-Name>
tab > vCenter Servers .
Register storage
149
RPA Clusters
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the Data Domains, arrays and vCenter Servers that are
currently registered at the selected RPA cluster and their storage information on page
148.
3. In the right pane, in the Registered Storage tab, click Add. The Register Storage
dialog box is displayed.
4. In the Register Storage dialog box:
l
150
RPA Clusters
Register storage
151
RPA Clusters
Procedure
1. Enter the IP address of the XtremIO Management Server (XMS).
If the XtremIO Management Server manages more than one cluster, register each
cluster separately.
2. Enter the Serial number (PSNT) of the XtremIO cluster.
3. Enter the XtremIO rp_user as the User.
4. Enter the rp_user password as the Password. This password can only be changed
using the XtremIO user interface.
152
RPA Clusters
Procedure
1. Enter the Data Domain IP address.
2. Enter the username and password for the block services for ProtectPoint pool and DD
Boost storage-unit in the Username and Password fields.
3. Enter the DD Boost Storage Unit to use as the ProtectPoint catalog.
4. By default, the Use FC for data transfer checkbox is selected. Uncheck to use IP only
for data transfer.
Register storage
153
RPA Clusters
Unregister storage
Unregisters storage from an RPA cluster.
Note
You can also unregister vCenter Servers by selecting RPA Clusters > RPA-Cluster-Name >
vCenters Server.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Storage.
154
RPA Clusters
In the right pane, the Registered Storage tab is displayed. The Registered Storage tab
contains the list of all of the storage currently registered at the selected RPA cluster,
and its storage information on page 148.
3. In the right pane:
a. Select your storage in the Registered Storage tab.
b. Click Remove.
You can also edit the registration details of a vCenter Servers from the vCenter
Servers on page 173 link.
In the right pane, the Registered Storage table is displayed. The Registered Storage
table contains the list of all of the arrays and vCenter Servers that are currently
registered at the selected RPA cluster and their storage information on page 148.
155
RPA Clusters
156
RPA Clusters
b. Click OK.
Information
Description
Name
Type
RAID groups
Storage pools
Data stores
157
RPA Clusters
Information
Description
l
vDisk pools
Total Size
Available
Size
The total capacity of the resource pool minus the capacity of the volumes that
were already allocated in the resource pool.
Tiers
The physical type of the storage. For example, Fibre Channel, SATA, etc.
Available
Tiering
Policies
The tiering policies that are available on storage and can be automatically
applied to volumes in RecoverPoint when users automatically provision volumes.
158
RPA Clusters
3. In the Registered Storage tab, select the array or vCenter Server whose resource pools
you want to unregister.
The Registered Resource Pools table is displayed in the Registered Storage tab. The
Registered Resource Pools table contains the list of all of the resource pools of the
Unregister resource pools
159
RPA Clusters
selected array or vCenter Server, that are currently registered at the selected RPA
cluster and their storage information on page 157.
4. In the Registered Resource Pools table:
a. Select the resource pool you want to unregister.
b. Click Remove.
Splitters
Note
In RecoverPoint, all installed splitters are automatically added to the system, and all
volumes that are masked and zoned to the RPA are automatically attached to all existing
splitters at a site. In the rare case that a splitter is added to the system after the system is
already installed, you will need to add the splitter to the system, and attach the relevant
volumes to the splitter. Multiple splitters can be attached to one RPA cluster. See the EMC
RecoverPoint Release Notes for the limitation on the maximum number of splitters that can
be attached to a cluster.
160
RPA Clusters
Results
The Splitters table is displayed in the right pane, with the following splitter-specific
information:
Information
Description
Status
Name
Type
RPA Link
Whether or not there is connectivity between the RPA and the splitter.
When a VPLEX splitter is selected in the Splitters table, the Directors are displayed above
the Volumes Attached to Selected Splitter section.
161
RPA Clusters
Information
Description
Group
Copy
Replication
Set
The name of the replication set that the volume belongs to.
Access
The data access state of the volume, with regards to the splitter. Once a volume
is configured in RecoverPoint, including attachment to a splitter, the RPA can
place the volume in any of the displayed states.
Also
Replicated
by SRDF
Add splitters
Connects your RecoverPoint write-splitters to RecoverPoint.
Before you begin
162
If splitters have been installed on your arrays before installing RecoverPoint, they will
automatically be added to the RecoverPoint system, see splitter installation in the
EMC RecoverPoint Installation and Deployment Guide and the RecoverPoint technical
notes for your specific splitter type. However, if a storage array was added to the
system after deployment, the splitter will need to be added to the system.
All splitters that are masked and zoned to the RPAs are automatically added to the
system, unless they are already attached to another RPA cluster. VPLEX, VNX and
Symmetrix splitters are automatically added to the system regardless of masking and
zoning, unless they are already attached to the maximum allowed number of RPA
clusters. See the EMC RecoverPoint Release Notes for the maximum number of RPA
clusters that can be attached to a splitter.
Splitters residing on arrays that are not licensed are not automatically added to the
system.
RPA Clusters
Splitters removed by the user will not be re-added automatically by the system.
ScaleIO splitters are added to the system after the automatic SAN rescan cycle is
complete. If the ScaleIO splitter is not visible in the system, manually run the
rescan_san CLI command.
For VNX splitters: Although the two storage processors are displayed as separate
entities (Splitter 1-A and Splitter 1-B), they are managed as a single entity. If you add
or remove a splitter, the second storage processor instance is automatically added or
removed.
If a production storage volume is rolled back by a VNX SnapView session, the VNX
splitter will automatically initialize a full sweep of any of the volumes attached to
the splitter.
A single VNX splitter can be shared by up to four 4 RPA clusters. While attaching a
VNX splitter to a fifth RPA cluster appears to succeed, the splitter is in an error
state for the newly attached RPA cluster. All splitter operations for this RPA cluster
fail and return the error: Maximum RPA clusters per splitter exceeded. In this case,
remove the VNX splitter from the fifth RPA cluster.
The Unity/VNXe splitter has a designated Snapshot Mount Point for every LUN. No
full sweep occurs when adding or rolling back array snaps.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Splitters.
3. In the right pane, click Add.
Note
The Add button is only enabled when there are splitters installed on the storage and
ready to add to the system.
4. In the Add Splitter dialog box; select the splitter that you want to add, and click OK.
If the selected splitter is a Unity/VNXe/VNX splitter, both SP-A and SP-B are added
when one of them is selected.
Add splitters
163
RPA Clusters
Remove splitters
Note
You must Detach volumes from the splitter on page 165 before you can remove it from
the system. Only splitters that are not attached to any volumes can be removed.
Procedure
1. Select RPA Clusters, and select the tab of the relevant RPA cluster.
2. In the left pane, click Splitters.
3. In the right pane; select one or more splitters in the Splitters table, click Remove, and
click Yes in the confirmation dialog box. If the selected splitter is a VNX splitter, both
SP-A and SP-B are removed when one of them is selected.
RecoverPoint automatically detects all paths from the splitter to the volume. If no
path exists between the splitter and the volume, you cannot attach the volume to that
splitter.
You cannot replicate a volume until it is attached to a splitter. You cannot fail over to
a local or a remote copy of a volume until it is attached to a splitter.
Although the two storage processors are listed as separate entities (Splitter 1-A
and Splitter 1-B), they are managed as a single entity. If you attach or detach a
volume at one instance, the same volume will automatically be attached or
detached at the other storage processor instance.
If you attach a volume to an RPA cluster, and that volume is already attached to a
different RPA cluster that shares the same VNX splitter, the volume appears to
attach successfully to the second RPA cluster, but then faults to the Attached to
other RPA cluster/s error state. The volume cannot be used by the RPA cluster to
which it was just attached. To correct this error, click Detach to detach the volume
from the RPA cluster.
Note
164
RPA Clusters
NOTICE
165
RPA Clusters
RPAs
Select RPA Clusters > RPA-Cluster-Name > RPAs to display all of the RPAs in the
RecoverPoint system and the status and properties of each RPA.
The RPA table displays the following information for each RPA.
Table 35 RPA table information
Column
Description
Status
Indicates if the RecoverPoint appliance, LAN interface card, and WAN interface
card are alive.
ID
The ID of the RPA. Each RPA in an RPA cluster has an RPA ID that starts with the
string RPA and ends with a number from 1-8. Only RPA1 and RPA2 can run the
cluster control.
WAN IP
Management
IPv4
The LAN IP address of the RPA, in IPv4 format. Use this address to open a direct
session with an RPA.
Connectivity
Indicates if communication to all RPAs in the RPA cluster is alive and if the
storage link, repository volume, data link, and communication with the remote
RPA are all alive; if one RPA is down, connectivity of every RPA in the cluster will
report an error.
When an RPA in the RPA table is selected, the tabs at the bottom of the screen display the
RPA:
166
RPA Clusters
Properties
Displays the main properties of each RPA.
Select an RPA in the RPA table, and then click the Properties tab.
Table 36 Properties tab information
Field
Description
RPA Cluster
ID
The ID of the RPA. Each RPA in an RPA cluster has an RPA ID that starts with the
string RPA and ends with a number from 1-8. Only RPA1 and RPA2 can run the
cluster control.
Properties
167
RPA Clusters
Status
Displays the connectivity statuses of each RPA.
Select an RPA in the RPA table, and then click the Status tab.
Table 37 Status tab information
Field
Description
RPA Status
Repository
Volume
Storage Link
WAN Interface
Whether or not the physical WAN port is alive, the interface card is functional,
and communication with other local RPAs exists.
FC Connectivity
Communication Whether or not the RPA has access to the remote RPA that it is paired with for
replication.
with Remote
RPA Cluster
168
Data Link
Whether or not data can be replicated to the remote RPA that the selected
RPA is paired with for replication.
LAN IPv4
Interface
Whether or not the physical LAN port is alive, the interface card is functional,
and communication with other local RPA (if any) exists.
RPA Clusters
Interface
The Interface tab displays the Fabric Interface settings of each RPA.
Select an RPA in the RPA table and click the Interface tab to display the Fabric Interface
settings for each RPA HBA port. These settings are required when replacing a faulty RPA.
Traffic Statistics
Select an RPA in the RPA table and click the Traffic Statistics tab to display the RPAs
traffic statistics.
The Traffic Statistics tab displays the following statistics for the selected RPA:
l
Interface
169
RPA Clusters
Total traffic
Displays the total amount of data that is transferred by the selected RPA in the SAN and
between clusters, in Mb/s.
Application traffic
Displays the total amount of application data that is transferred by the selected RPA in
the SAN and between clusters, in Mb/s.
Initialization traffic
Displays the total amount of data that is transferred by the selected RPA in the SAN and
between clusters during RecoverPoint initialization, in Mb/s.
170
RPA Clusters
Usage Statistics
Select an RPA in the RPA table and click the Usage Statistics tab to display the RPAs
resource usage statistics.
The Usage Statistics tab displays the following statistics for the selected RPA:
l
Incoming writes
Displays the amount of incoming writes that are transferred by the selected RPA, per
second.
Usage Statistics
171
RPA Clusters
Bandwidth reduction
Displays the ratio by which the bandwidth usage of the selected RPA is reduced per
minute due to RecoverPoint.
CPU usage
Displays the percent of the selected RPAs CPU that is utilized per minute.
172
RPA Clusters
vCenter Servers
Select RPA Clusters > RPA-Cluster-Name > vCenter Servers to display the vCenter server
table, monitor, register, or remove vCenter Servers. The vCenter user should have the
necessary privileges to perform the desired tasks.
Figure 11 RPA Clusters: vCenter Servers
When the vCenter Server's IP address is selected, the bottom pane displays the vCenter
Servers object, and under it, all VMware vCenter Servers registered with RecoverPoint.
The view displays data extracted from the VMware vCenter Server together with
RecoverPoint replication data.
In addition to displaying ESX servers and all their virtual machines, datastores, and RDM
drives, the RecoverPoint vCenter Server view also displays the replication status of each
volume. The RecoverPoint vCenter Servers view is for monitoring only (read-only).
Select the vCenter Servers link to:
l
173
RPA Clusters
For more information about the location of the security certificate, refer to Replacing
vCenter Server Certificates VMware vSphere 4.0, available at www.vmware.com.
Information
Replication
status
Icon
Description
Fully configured for replication
Partially configured for replication
Not configured for replication
IP address
l
Every LUN and raw device mapping accessed by each virtual machine, with the
following details:
n
Replication status: fully configured for replication or not configured for replication.
n
For LUNs or devices configured for replication by RecoverPoint, the following are
displayed: consistency group, copy (Production, Local, Remote), replication set,
and which datastore for each LUN or raw device mapping is configured for
replication.
174
RPA Clusters
Setting
Description
vCenter Server IP address of the vCenter Server. This is also the display name of the vCenter
IP
Server in the top pane.
Port
Username
Password
Certificate
If you wish to specify a certificate, browse to and select the certificate file.
Setting
Description
vCenter Server IP address of the vCenter Server. This is also the display name of the vCenter
IP
Server in the top pane.
Port
Username
Password
Certificate
If you wish to specify a certificate, browse to and select the certificate file.
175
RPA Clusters
3. In the right pane; select a vCenter Server, click Remove, and click Yes in the
confirmation dialog box.
176
CHAPTER 6
Admin
This section describes how to license and register RecoverPoint, how to manage users,
roles, and user authentication, how to configure system notifications, detect bottlenecks
in replication, analyze the load on each RPA, and collect system information for support
purposes. This section also describes how to export statistics and use the statistics tool
through the RecoverPoint CLI.
l
l
l
l
l
l
Admin
177
Admin
RecoverPoint Administration
Administration of RecoverPoint users and the RecoverPoint system is performed through
the Admin menu.
Option
When to Use
Manage
Licenses
To add or remove your RecoverPoint license files from the system or view your
RecoverPoint license details.
Users and
Security
To manage users, roles, and user authentication. To log off and log back in as a
different user, to change the currently logged in user, the password of the
currently logged in user, or after how much idle time to log off the user.
System
Analysis
Tools
To detect bottlenecks in replication, analyze the load on each RPA, and collect
system information for support purposes.
To configure system reports and alerts, manage event filters and call home
System
Notifications events.
Manage Licenses
Select Manage Licenses to add or remove RecoverPoint licenses from the system.
178
Admin
Install a license
Before you begin
l
Procedure
1. Select Admin > Manage Licenses to display the Manage Licenses screen.
b. Click Browse...
c. Select the license file.
Install a license
179
Admin
d. Click OK.
Remove licenses
Procedure
1. Select Admin > Manage Licenses.
2. Select the license that you want to remove, and click Remove.
Note
A warning is issued if removing the license may cause the system to exceed the
allowed replication capacity (for example, when an array license is removed but an
existing consistency group contains volumes that reside on the removed array).
180
Admin
b. Click Download to download the file to your computer, select a location on your
computer to store the file, and click Save.
4. Open the exported file:
a. Open MS Excel.
b. Open the *.csv file from the location you selected in the previous step. The Excel
Text Import Wizard is displayed to help you set the import options.
c. In the Excel dialog box, select Delimited, and click Next.
d. In the Delimiters field, select Comma, and click Next.
e. Click Finish.
Parameter Values
Type
Description
Replication Local
RecoverPoint/CL: None
Remote
Capacity
<Capacity>
Expiration
<Date>
Permanent
Active
Expired
Status
181
Admin
Parameter Values
Inactive
Description
The license is not active. This can happen when:
l
Note
Check the displayed information against the license file variables on page 269 for
correctness and Monitor your license limits on page 180 to ensure that you are
replicating well within the limits of your RecoverPoint license.
Register RecoverPoint
Select the Register RecoverPoint menu to fill out or update your RecoverPoint postdeployment form and automatically send it to the EMC Install Base Group, registering
your RecoverPoint product.
182
The RecoverPoint registration process will fail if you do not first configure your SMTP
address on page 227.
Admin
The registration process will be incomplete if valid values are not provided for every
field in the post-deployment form.
When a new RPA cluster is added to the system, it is automatically added to the postdeployment form with empty parameter values. Ensure you have entered the values
for all new RPA clusters before sending the post-deployment form to the IB group.
Procedure
1. Select Admin > Register RecoverPoint to display the RecoverPoint Post-Deployment
Form.
2. Click Update Form to display the Update Post-Deployment Form Details dialog box.
Field
Description
For Example
Activity Type
Upgrade
Location
183
Admin
Field
Description
For Example
Upgrade/
Installation
Performing
Resource
Customer
Sales Order
Number
62276566
VCE
Selected=Yes
Unselected=No
or Unknown
VCE = VMware+Cisco+EMC
Connect Home
184
Admin
Field
Description
For Example
c. Click Apply to save each change to the form, without closing the dialog box.
d. Click OK to save all changes and close the dialog box.
NOTICE
If your company does not have SyR connectivity, and therefore, you cannot
Configure system reports and alerts on page 227, you can skip the rest of the
steps in this procedure, Export the post-deployment form to a CSV file on page
186 and Registering RecoverPoint by email or phone on page 186 now.
4. Click Send Form to automatically send the post-deployment form to the EMC Install
Base group. The Send Form dialog box is displayed.
5. In the Send Form dialog box, enter the email address of the person at your company
that is in charge of RecoverPoint maintenance and operation.
Note
Call home event 8000 is sent to EMC with your updated registration information and
an email is sent to the specified email address from EMC Customer Support to verify
that your registration details were updated successfully in the EMC Install Base.
6. Wait a couple of minutes.
7. Select Dashboard > System Events and look for events 8000 Calling homeCalling
home. If event 8000 is logged; the registration details were successfully sent to the
EMC Install Base.
Results
The following information is automatically sent along with the information that you
entered into the post-deployment form, per RPA cluster:
l
Software serial ID
Cluster name
185
Admin
License type
186
Admin
The registration process will be incomplete if valid values are not provided for every
field in the post-deployment form.
Procedure
1. Access https://support.emc.com
2. Search for the term Post-Deployment Form
3. Download and fill out the EMC RecoverPoint and RP for VMs Post-Deployment Form
4. Send the information to the EMC Install Base group:
l
EMC customers and partners: Email the post-deployment form to the Install Base
group at rp.registration@emc.com.
EMC employees:
n
Manage Users
Select Admin > Users and Security > Manage Users to view, add, remove and modify
RecoverPoint users.
187
Admin
User
Role
security-admin security
security-admin
admin
admin
admin
boxmgmt
boxmgmt boxmgmt
Boxmgmt/Upgrade
Note
Only users with security permissions on page 192 can add users, and can remove
and edit permissions for users that have previously been added.
To change the passwords of pre-defined users on page 188, Switch User on page
199 and Change Password on page 198.
If you wish to implement a purely LDAP-based authentication system, you need not
give out the passwords of any pre-defined users on page 188.
Procedure
1. Select Admin > Users and Security > Manage Users. The RecoverPoint user list is
displayed.
2. Click Add. The Add User dialog box is displayed.
188
Admin
Binding to the LDAP server will fail unless at least one of the following is true:
a. The connection to the server uses LDAP over SSL (only if the Active Directory
supports SSL).
b. Anonymous binding is used.
c. Signing requirements are set to "none" in Active Directory.
Settings
Description
Local User
User Name
Password
Confirm
Password
Manage Users
189
Admin
Settings
Description
LDAP User or
Group
User Name
Groups
User Settings
Role
Only for selected When checked, limits the access of this local user, LDAP
groups
user, or LDAP group to the specified consistency groups.
Groups
Only users with security permissions on page 192 can edit users.
Procedure
1. Select Admin > Users and Security > Manage Users.
2. To edit a local user, an LDAP user or LDAP group:
l
190
Admin
c. Select one of the pre-defined roles on page 192 from the drop-down in the
User Settings section.
d. If required, modify the access to specific consistency groups by selecting Only
for selected groups.
e. Click OK.
Remove users
Before you begin
l
Only users with security permissions on page 192 can remove users.
Procedure
1. Select Admin > Users and Security > Manage Users.
2. Select a user.
3. Click Remove.
Manage Roles
Select Admin > Users and Security > Manage Roles to view, add, remove and modify
RecoverPoint roles.
Manage Roles
191
Admin
Role
Permissions
security
Security
Read only
System configuration
Storage management
Splitter configuration
Upgrade
Data transfer
Failover
Boxmgmt
Group configuration
Target image
Read only
admin
boxmgmt
Boxmgmt
monitor
Read only
192
Permission
Description
Splitter
Configuration
Group
Configuration
Create and remove consistency groups, and modify all group settings except
those that are included in the data transfer, target image, and failover
permissions, may bookmark images, and resolve settings conflict.
Admin
Permission
Description
Storage
Management
Register arrays and vCenter Servers, and update storage registration details for
arrays and vCenter Servers.
Data Transfer
Enable and disable access to images, and undo writes to the image access log.
Target Image
Enable and disable access to images, resume distribution, and undo writes to
the image access log.
Failover
System
Configuration
Configure and manage e-mail alerts, SNMP, System notifications, alert rules,
licenses, syslog, and other system configuration settings.
Security
All commands dealing with roles, users, LDAP configuration, and security level.
Upgrade
Web
download
Only users with security Table 46 on page 192 can add, edit, or remove roles added
by the user.
Procedure
1. Select Admin > Users and Security > Manage Roles.
2. Click Add. The Add Role dialog box is displayed.
Manage Roles
193
Admin
3. Enter a new role name and set the required access permissions using the following
settings.
Table 47 Permission settings
Setting
Description
Role
Permissions
Select the access Table 46 on page 192 to be granted to all persons who are
assigned to this role.
4. Click OK.
Only Table 44 on page 188 with security Table 46 on page 192 can edit roles.
Procedure
1. Select Admin > Users and Security > Manage Roles.
2. Select a role.
3. Click Edit. The Edit Role dialog box is displayed.
4. Change the role name and/or select new Table 46 on page 192.
Remove a role
Before you begin
194
Only pre-defined users on page 188 with security permissions on page 192 can
remove roles.
Admin
Procedure
1. Select Admin > Users and Security > Manage Roles.
2. Select a role.
3. Click Remove, and click yes in the confirmation dialog box that appears.
Only users with security permissions on page 192 can configure user authentication
through an organizations Microsoft Windows Active Directory LDAP server.
RecoverPoint only accepts LDAP certificates in PEM format. To format the certificate
created on the LDAP server in PEM format, use the following procedure:
1. On the LDAP server, export a copy of the server certificate from the Active Directory
server. Use the Certification Authority application's Copy File to option to export
the certificate in Base-64 Encoded X.509 (.cer) format.
2. Copy the server certificate to a system with OpenSSL Certificate Authority software
installed. You can use any Linux or Windows system.
3. Log into the system where you copied the certificate, and run the following
command to create the PEM certificate:
n
195
Admin
Procedure
1. Select Admin > Users and Security > Manage User Authentication. The Manage User
Authentication screen is displayed.
Settings
Description
Enable Active
Directory Support
LDAP Configuration
Primary LDAP server IP address of the primary LDAP server
Secondary LDAP
server
Base Distinguished Node in the LDAP tree from which to start a search for users:
Name
dc=Klaba,dc=COM
Search Base
Distinguished
Name
Root of the LDAP user search tree. The suffix of the Search Base
Distinguished Name must be the Base Distinguished Name. The format will
be similar to the following:
cn=Users,dc=Klaba,dc=COM
Binding Type:
196
Admin
Settings
Description
Distinguished name to use for initial binding when querying the LDAP
server. The format of the Bind Distinguished Name will be similar to the
following:
cn=Administrator,cn=Users,dc=Klaba,dc=COM
The bind distinguished name can be any user on the LDAP server who has
read permission for the directory in the defined search base.
Password
Password of the bind distinguished name to use for initial binding when
querying LDAP server
Upload certificate
from file
Select if you want to enter a path to an Active Directory certificate to use for
secure communication with LDAP server.
To export the certificate and format it in PEM format:
On the LDAP server, export a copy of the server certificate from the Active
Directory server. Use the Certification Authority application's Copy File to
option to export the certificate in Base-64 Encoded X.509 (.cer) format.
Copy the server certificate to a system with OpenSSL Certificate Authority
software installed. You can use any Linux or Windows system.
Log into the system to which you copied the certificate, and run the
following command:
On Linux:
> /opt/symas/bin/openssl x509 -in AD_certificate_name -out
OpenLDAP_certificate name
On Windows:
> openssl x509 -in drive:/path/AD_file.cer -inform d -out drive:/path/
OpenLDAP_file.pem
Advanced settings
The advanced settings are optional and can be left at their default values.
Search time limit
Default 30 sec.
3. Click Apply.
4. Test LDAP settings on page 198 to verify that you have configured LDAP correctly.
197
Admin
Change Password
Select Admin > Users and Security > Change Password to change the password of the
currently logged-in user.
Procedure
1. Enter your current password.
2. Enter the new password in the New Password and Confirm Password fields according
to the password rules of your user's security level.
198
Admin
3. Click OK.
Switch User
Use the following procedure to log off, and log back in as a different RecoverPoint user.
Select Admin > Users and Security > Switch User to log off, and log back in as a different
RecoverPoint user.
Procedure
1. Enter the username and password of the user as whom you want to log into
RecoverPoint.
2. Click Login.
Only pre-defined users on page 188 with security permissions on page 192 can
change the security level of a user.
Switch User
199
Admin
Regardless of the security level, any user who tries unsuccessfully three times to log
in will be locked out. To unlock the user, use the CLI command unlock_user. Only
users with security permission can unlock a user.
cannot be reused until at least ten other passwords have been used.
expire in 90 days.
When the security level is set to Basic, user passwords must have a minimum of five
characters.
Procedure
1. Select Admin > Users and Security > Change Security Level.
2. Select either High or Basic.
3. Click OK.
200
Admin
Note
You can also access additional system analysis tools through the RecoverPoint CLI. Use
the RecoverPoint CLI to export statistics , export consolidated statistics , and load the
statistics analysis tool.
Detect Bottlenecks
Use Admin > System Analysis Tools > Detect Bottlenecks to display statistics about
system performance by group, RPA, or RPA cluster, and use the statistics to identify and
mitigate bottlenecks in transfer.
Procedure
1. Define the Bottleneck Detection Settings as described below. Note that in bottleneck
detection, the entered times are according to the local time and the analysis output is
according to GMT.
Detection Mode
Default=System overview and bottleneck analysis
Type of analysis to perform.
Possible values are System overview and bottleneck analysis, Initialization periods,
High load periods, Initialization, high load, and peak analysis, Advanced analysis,
and Peak analysis.
Start
Default=Earliest available time
Start time for analysis. Possible values are:
Detect Bottlenecks
201
Admin
l
l
202
Admin
Description
Start New
Analysis
To stop the current analysis and display the screen containing the bottleneck
analysis settings.
Note
Detect Bottlenecks
203
Admin
Balance Load
Use this procedure to analyze the load on each RPA and display a load balancing
strategy.
Before you begin
204
Load balancing is only available on the RPA running the cluster control, or through
the floating Cluster Management IP. Load balancing will not work if the RPA running
the cluster control is down. If this RPA goes down, and then back up again, five
minutes must pass before load balancing can be performed again.
For best results, groups should be configured and replicating for seven days before
performing load balancing, so that a long enough traffic history is available for the
load balancing analysis.
Groups can be excluded from the load balancing recommendation. However, even
when excluded from the recommendation, all groups are included in the analysis.
The load balancing analysis is performed on all RPAs in the environment. If there are
three RPAs in total, and one of them goes down for a week, and it is the primary RPA
of a group included in the analysis, the load balancing recommendation calculations
are still based on the total number of RPAs, as if they were all working. In other
words, the load balancing mechanism accumulates group statistics for its
calculations, as if groups were always running on their preferred RPAs, even if
flipovers happened during the week.
Load balancing can identify cases in which distributed group segments do not
actually require four separate RPAs to run on, and recommend RPA assignments
accordingly. Distributed group segments can be run on different RPAs, or the same
RPA, and each group segment is treated as a separate group in the load balancing
analysis and recommendation. If you are not well acquainted with distributed
consistency groups, it is recommended that you become acquainted with how they
Admin
work before using the load balancing tool (see the EMC RecoverPoint Glossary of Terms
for more information on distributed consistency groups).
l
To ensure consistency, consistency groups are initialized when moving from RPA to
RPA. During switchover, all groups running on the preferred RPA are initialized once
when they move to the non-preferred RPA, and then another time when they switch
back to their preferred RPAs. Therefore, any re-assignment of RPAs during replication
should be carefully planned out, as not to affect the performance of the production
host applications.
Since the modification of preferred RPA assignments causes flipovers that cause
initializations, if the load balancing analysis finds that no significant changes in
workload or number of consistency groups have occurred, the mechanism will not
recommend preferred RPA re-assignment.
The load balancing mechanism smooths-out I/O statistics, so that any sudden peaks
or lapses in traffic do not cause it to recommend unnecessary changes.
Procedure
1. Select Admin > System Analysis Tools > Balance Load.
2. Select the consistency groups to exclude from the analysis.
Note
The groups that you select will be preceded by an asterisk in the load balancing
recommendation, and their traffic statistics will be included in the analysis upon
which the recommendation is based.
3. Click Start to start the analysis. A progress bar is displayed.
Balance Load
205
Admin
Description
Start New
Analysis
To stop the current analysis and display the screen containing the load
balancing settings.
Note
A normal scope event is logged indicating that the load balancing process has
ended. The event contains a copy of the load balancing recommendation output.
206
Admin
Action is necessary. The environment is not stable because groups are not
evenly distributed across all RPAs. To correct this, manually modify the
Preferred RPA of each group.
Action may be necessary. The environment is stable, although groups are not
evenly distributed across all RPAs, and this may affect future performance. To
distribute groups evenly across all RPAs, manually modify the Preferred RPA of
each group.
The current preferred and recommended RPA assignments are displayed per
consistency group, along with each RPAs average throughput and incoming writerate, in a Recommended Load Distribution table.
Note
Two tables, Traffic per RPA before Application of Recommendation and Traffic per
RPA after Application of Recommendation, are displayed in order to aid you in the
process of understanding the performance implications on all RPAs, if you do
choose to apply the recommendation. Each RPAs average throughput and IOPS are
displayed, and the RPA with the least amount of traffic is highlighted, in each of
the tables.
Balance Load
207
Admin
Ten load balancing output files are stored in this location at a time. When ten files
have already been stored, the older files are removed to make way for newer files.
The date and time of the output file is indicated in the filename.
208
Admin
In order to collect system information for VNX and VPLEX splitters, you must first
Attach volumes to the splitter on page 164.
Collect System Information
209
Admin
The system information collected from RPAs also includes Dell OMSA hardware
configuration information, provided the RPAs are running on Dell PowerEdge
platforms.
To retrieve the output file containing the system information, you must log in as one
of the Table 44 on page 188 with boxmgmt Table 46 on page 192.
It is not possible to collect Unity/VNXe system information remotely through the RPA.
Collect Unity/VNXe and RecoverPoint Unity/VNXe splitter system information
manually using the Unity/VNXe Unisphere. Unity/VNXe credentials are required for
system information collection.
Procedure
1. Attach volumes to the splitter on page 164 for all splitters in the system.
2. Select Admin > System Analysis Tools > Collect System Information.
3. If this is your first time collecting system information, click Start. Otherwise, click
Start New Collection Process.
The Collect System Information wizard is displayed, to guide you through the
collection process.
NOTICE
You can also collect system information around a specific event by selecting
Dashboard > System Events. Then select an event in the event log and click Collect
System Information. The Collect System Information wizard is displayed and the
collection start and end fields are automatically set to 10 minutes before and after the
selected event.
4. Define the Table 49 on page 210.
Table 49 System information collection settings
210
Setting
Description
From
Admin
Setting
Description
Although the system information of the past thirty days is available for
collection, only three days of system information can be collected at a
time.
GMT is not adjusted for daylight savings time.
To
Include Information
from RPA Clusters
Optional
Default=selected
When selected, enables the collection of system information from RPA
clusters.
RPA clusters
Optional
Default=all RPA clusters
The RPA clusters from which to collect system information. If none of the
checkboxes are selected, only the system information of the RPA cluster
from which the collection process is triggered is collected.
Only relevant when Include Information from RPA Clusters is selected.
Optional
Default=disabled
Whether or not to include core files in the output. Core files may be large.
Subsequently, including these files in the collection process may
substantially increase collection time.
Only relevant when Include Information from RPA Clusters is selected.
Optional
Default= selected
When selected, enables the collection of all system logs.
Advanced
Optional
Default= disabled
Use only when explicitly instructed to do so by EMC Customer Support.
When selected, enables the collection of system logs. Use this option to
reduce log collection time.
Select one or more of these categories:
l
CLI
Control
Replication
Storage
Collect System Information
211
Admin
Setting
Include Information
from Splitters
Description
l
Monitor
Management
Optional
Default=selected
When selected, enables the collection of system information from the
selected splitters.
Note
The IP or DNS address of the FTP server to which to upload the collection
process output file.
For example: 10.250.20.40 or ftp.EMC.com
Port
User Name
The username to use when logging into the specified FTP server.
Password
The password to use when logging into the specified FTP server.
Remote Path
Optional
The path to the copy of the output file stored on the specified FTP server.
For example: / (to access the rootdir)
Override default
filename (Not
recommended)
Optional
Default=disabled
Whether to override the default file name of the output file placed on the
FTP server.
It is recommended to keep the default file name.
212
Admin
Setting
Description
When selected, RecoverPoint renames the output file uploaded to the FTP
server according to the new file name specified in the Filename field.
Optional
The new file name for the output file placed on the FTP server.
Only relevant when Override default filename is selected. It is
recommended to clear the Override default filename checkbox, and keep
the default file name as is.
6. In The Test Connectivity screen, review the displayed information to verify that your
configuration settings are correct, and the system can access all RPAs and splitters:
l
Verify that the Collection Settings are configured as intended. If required, click
Back to Define Settings to edit your settings.
Verify that a green check mark exists in the Status column of all listed splitters and
RPAs, and that the text Action succeeded exists in the Details column of all listed
splitters and RPAs. If all splitters and RPAs do not have green check marks in their
Status columns, you can collect the information directly from individual hosts on
which the feature is enabled.
7. Click the Finish button to initiate the collection process. A progress bar is displayed,
and the collection process begins.
213
Admin
Note
Be patient. The collection process can take awhile, depending on the time span and
the amount of data being collected.
8. During the collection process, you have the following options:
Table 50 Collect system information options
Option
Description
Display Results
214
Admin
System Notifications
Use the System Notifications menu to manage event filters, configure system reports and
alerts and manage call home events.
System Notifications
215
Admin
216
Admin
a. Define the event filter settings according to the instructions in the following table.
Table 51 Event Filter settings
Setting
Description
Filter Name
Topic
Groups
All Topics
Site
RPA
Consistency Group
Splitter
Array
Level
Scope
Event IDs to
Exclude
Normal: To report selected basic events and root-cause events. A rootcause event returns a single description for a system event that can
spawn an entire set of detailed and advanced events. When
Scope=Normal, all of those detailed and advanced events are filtered
out, leaving only the normal events. This is the default setting, and in
most cases, it is sufficient for effective monitoring of system behavior.
Detailed: This category includes all events (that is, detailed and
normal), with respect to all components, that are generated for use by
users.
The IDs of the Events that are not subject to this filter.
217
Admin
Setting
Description
Note
c. Click Finish to save the event filter and exit the wizard.
5. Configure the transfer method on page 218 for each method of transfer that you
defined.
218
Admin
3. Enter the values for the fields in the Email tab according to the instructions in the
following table.
Table 52 Email settings
Setting
Description
Enable Email
Notifications
Select to enable the events defined in any event filters whose method of transfer
is set to Email to be transferred to the specified server from the specified sender.
Note
Selecting this checkbox also enables the sending of email alerts to the specified
server address if you enabled both reports and alerts in the Configure System
Reports and Alerts on page 226 screen.
SMTP server
address
Enter the IP address or DNS name of the server to which to send the emails.
Note
When you click Apply, any change to this field automatically updates the SMTP
server address field in the Configure System Reports and Alerts on page 226
screen.
Sender
address
Enter the email address that should appear in the sender field of all emails
concerning sent to the specified server regarding event notifications.
4. Click Apply.
Results
All of the event filters whose Method of Transfer includes Email will be transferred to the
recipients defined in the filter (at the frequency defined in the filter) using the specified
server address and sender.
219
Admin
3. Enter the values for the fields in the Syslog tab according to the following table.
Table 53 Syslog settings
Setting
Description
Enable Syslog
Notifications
Select to enable the events defined in any event filters whose method of transfer
is set to Syslog to be transferred to the specified servers with the specified label.
Facility
Specify target
host for
(Optional) Specify the syslog server at each RPA cluster to which you wish to
deliver notifications. The address may be either in IP or DNS format. A DNS
address will work only if a DNS server is configured in the RecoverPoint system.
4. Click Apply.
Results
All of the event filters whose Method of Transfer includes Syslog will be transferred by
Syslog using the specified target host and facilities.
220
Admin
3. Enter the values in the fields of the SNMP tab according to the following table.
Table 54 SNMP settings
Setting
Description
Enable SNMP
Agent
Select to enable the RecoverPoint SNMP agent to send all of the events defined
in any of the event filters whose method of transfer is set to SNMP to the
specified servers with the specified label.
The RecoverPoint SNMP agent must be enabled in order to send SNMP traps
(notification events) and to respond to host-initiated SNMP queries.
Allow secure
transports
only
When selected, only encrypted SNMP queries over secure transport will be
enabled; use of community strings and SNMP over an unsecured port will be
disabled.
Send event
traps
Specify trap
(Optional) The network management server to which you wish to deliver
destination for notifications. The address may be either in IP or DNS format. A DNS address will
work only if a DNS server is configured in the RecoverPoint system.
SNMP v1 RO
community
If you are using SNMP version 1, enter an SNMPv1 read-only community string to
enable the use of SNMPv1 community strings. If not enabled, only SNMPv3 user
names with passwords or certificates are enabled.
Note
221
Admin
Info
Warning
Error
The RecoverPoint SNMP trap variables and their possible values are listed in the
following table.
Table 55 RecoverPoint SNMP trap variables
222
Variable
OID
Description
dateAndTime
3.1.1.1
eventID
3.1.1.2
Unique event identifier; the values are listed in the Events chapter
of this Administrators Guide.
siteName
3.1.1.3
eventLevel
3.1.1.4
info
warning
warning off
error
Admin
Variable
OID
Description
l
eventTopic
3.1.1.5
error off
site
K-Box
group
splitter
management
hostName
3.1.1.6
Name of host
kboxName
3.1.1.7
Name of K Box
volumeName
3.1.1.8
Name of volume
groupName
3.1.1.9
Name of group
eventSummary
Note
OpenManage Server Administrator (OMSA) support is available only for systems in which
the RPAs are running on Dell PowerEdge platforms.
OMSA support provides RecoverPoint customers with the ability to:
l
Collect System Information on page 209 that includes Dell hardware configuration
information.
223
Admin
224
Admin
4. Modify the event filter settings according to the instructions in Create an event
filter on page 216.
5. Click Next Define Method of Transfer.
6. If necessary, in the Define Method of Transfer screen, modify the methods of transfer.
For each new method of transfer that you define, Configure the transfer method on
page 218.
7. Click Finish to save the new event filter settings and exit the wizard.
225
Admin
Depending on the severity of the event, system alerts will automatically open a service
request with EMC Customer Support and will attach the latest system report to the service
request. System alerts are sent in real-time (at the time that the event occurs), allowing
EMC to provide preemptive support for RecoverPoint issues.
System reports contain the configuration and state of the RecoverPoint system, and they
are sent to the EMC system report (SyR) database every Sunday. Only one system report
is sent at a time (containing the information of all RPA clusters) unless there are
connectivity issues between RPA clusters, or an RPA cluster in the RecoverPoint system is
unable to send a system report. In this case, the problematic RPA cluster will send its own
system report. All system reports contain the name of the RPA cluster that they are sent
from.
The following parameters are sent to the EMC system report (SyR) database and included
in any opened service requests:
Table 56 System parameters sent to SyR
Parameter
Description
System ID
The unique identifier of all activated RPA clusters in a RecoverPoint system. The
System ID:
l
Is generated for the first RPA cluster that is added to the system during
RecoverPoint deployment. When adding additional RPA clusters to the
system, the additional RPA clusters receive the System ID of the first RPA
cluster.
Does not change with upgrades. When upgrading to RecoverPoint 4.0 from
previous RecoverPoint versions, the System ID value is taken from the value
of Account ID in the previous RecoverPoint version.
SSID
226
The Software Serial ID. The unique identifier of an RPA cluster in the RecoverPoint
system. The SSID is the identification used by the install base to support EMC
equipment installed at customer sites, through the system reporting and ESRS
mechanisms.
Admin
Parameter
Description
Note
The format and function of the SSID has changed from previous RecoverPoint
versions.
The SSID is in the format <SN>EID<RPA cluster ID>, where <SN> and <RPA cluster ID>
are described in the licensing section of the EMC RecoverPoint Product Guide. Its
length can be no more than 22 characters, and therefore, the RPA cluster ID will
be truncated as required. The SSID:
Site ID
Is generated for each RPA cluster when the first license related to the RPA
cluster is added to the system. When additional licenses are added to the
system, the SSID of the RPA cluster does not change.
If no license was added for an RPA cluster, the SSID of that RPA cluster will
be empty.
Does not change with upgrades. When upgrading to RecoverPoint 4.0 from
previous RecoverPoint versions, the SSID value is taken from the value of the
SSIDs in the previous RecoverPoint version.
Does not change even if the SSID SN from which it was generated no longer
exists in any of the installed licenses.
Is obtained from the value of the <Site_Info> parameter in the license file
variables. Its value is set by the first installed license for an RPA cluster.
Note
If no license was installed for an RPA cluster, the Site ID of that RPA cluster
will be empty.
l
Does not change even if the <Site_Info> from which it was generated no longer
exists in any of the installed licenses.
Best practice is to keep both system reports and alerts, and compression and
encryption enabled.
System reports and alerts will only be sent provided a method of transfer (SMTP,
ESRS, or FTPS) is configured. You can configure the method of transfer using the
Getting Started Wizard or by selecting Admin > System Notifications > Configure
System Reports and Alerts.
Configure System Reports and Alerts
227
Admin
To transfer system reports and alerts using SMTP or ESRS, ensure that port 25 is open
and available for SMTP traffic.
To transfer system reports and alerts using FTPS, ensure that ports 990 and 989 are
open and available for FTPS traffic.
To send system reports and alerts, a permanent RecoverPoint license must exist in
the system; system reports and alerts will not work with a temporary license.
By default:
l
System reports and alerts are sent through SMTP, but they can be configured for
transfer through a customer's ESRS server, or RecoverPoints built-in FTPS server.
System reports and alerts are compressed and encrypted with RSA encryption using a
256-bit key before they are sent.
Procedure
1. Select Admin > System Notifications > Configure System Reports and Alerts.
2. Ensure that the Enable System Reports and Alerts checkbox is selected, and the radio
button is set to System reports and system alerts .
3. Ensure that the Compression and Encryption checkboxes are selected.
4. Define the transfer method.
l
228
Admin
c. Click Apply.
Note
The connectivity test, if successful, opens a service request containing call home
event number 30999 and sends an email to the specified verification email address
from EMC Customer Support to verify that the system reports mechanism (SyR) has
been successfully configured.
4. Wait ten minutes.
5. Select Dashboard > System Events and look for event 1020 Failed to send system
report.
Configure System Reports and Alerts
229
Admin
If this event does not appear in your event logs, the system notifications
mechanism has been properly configured.
If you do receive event 1020; check whether there is an issue with your selected
method of transfer. If a problem exists, fix it, configure system reports on page 227
and click Test Connectivity again. If problem persists contact EMC Customer
Support.
RecoverPoints call home feature is a proactive online service capability of RPAs that
enables RPAs to continuously monitor their own health, and the health of the
RecoverPoint system, using a pre-defined set of event-filtering rules. The call home event
mechanism automatically notifies EMC Customer Support of potential issues, using
secure transmissions. If a serious problem arises, the call home mechanism
automatically detects it and opens a service request with EMC Customer Support. When
the service request is received, EMC Customer Support pro-actively engages the relevant
EMC personnel to start working on the issues resolve, and immediately start working with
the relevant customer parties, or uses a configured ESRS gateway, to resolve the issue.
The call home event mechanism is customizable so that any specific environment or
specific customer requirement can be accommodated. EMC Customer Support have the
ability to create additional call home events, as required, to meet a specific customer's
needs. They can also permanently disable or temporarily suppress call home events. For
example, if an RPA cluster keeps reporting a problem that EMC Customer Support are
already aware of and have scheduled a customer visit to fix next week, the event
reporting the issue can be suppressed for a period of 2 weeks.
Admin
1. RecoverPoint event number 8000 "Calling home" is displayed in the event log,
and in parallel; a call home event is sent to SyR.
2. SyR opens an SR (Service Request) with EMC Customer Support, and relays the
following information:
l
Whenever the logic of a call home event script cannot be fulfilled, RecoverPoint event
8001 is generated in the event logs.
RecoverPoint ships with a set of pre-defined call home events that are enabled by
default.
The call home events mechanism is not available when the RPA running the Cluster
control is down.
The call home events mechanism is disabled during upgrade and while RecoverPoint
is in maintenance mode. The call home events mechanism discards any events
issued while the system is in maintenance mode.
The call home events, and the last call home time for each event, will survive RPA
failure. In the case of a disaster, all of the user-defined call home events, and any call
home events that may have been logged up until the time of the disaster, are
retrievable. This information will not, however, survive repository volume format.
The call home event mechanism is based upon with the most current system settings.
Therefore, if one of the rules in a call home event references a system property (e.g.
replication type), the value of the property must be the current value of the property
in the system settings. The call home mechanism does not save previous settings. If a
rule refers to a system entity (e.g. group, splitter, etc), and the entity has been
deleted from the system (and therefore, the system settings), no call home event is
issued.
The call home events mechanism automatically includes the contact information
defined in the contact_info parameter of the config_user_account CLI
command in the Service Request which is opened with EMC Customer Support. In
Manage Call Home Events
231
Admin
order to ensure a swift turnaround time, ensure that the contact_info parameter
contains both the email address and the telephone number of the person at your
company that is designated to mitigate RecoverPoint support situations. If contact
information is not specified and a call home event is triggered, a Service Request is
still opened, but it will not contain this information, which will elongate the cases
time to resolve.
Suppress one call home event until a specific date and time
Use the following procedure to suppress one call home event for a specific period of time.
Procedure
1. Select Admin > System Notifications > Manage Call Home Events
2. Select the event.
3. In the Status area of the bottom pane, select the Suppress Until radio button, and set
the date and time fields.
4. Click Apply.
NOTICE
Note the change in the event status in the Status column of the event table. To enable
suppressed events, select the event in the table, change the date and time fields to
the current date and time, and click Apply.
Suppress all call home events until a specific date and time
Use the following procedure to suppress all call home events for a specific period of time.
232
Admin
Procedure
1. Select Admin > System Notifications > Manage Call Home Events
2. Select the event.
3. Click the Suppress All button under the event list. The Suppress All dialog box is
displayed.
4. In the Suppress All dialog box, set the date and time fields, and click OK.
NOTICE
Note the change in the status of all of the events in the Status column of the event
table. To enable all of the suppressed events, click Suppress All, set the date and
time fields to the current date and time, and click OK.
233
Admin
234
CHAPTER 7
Support
This section describes all of the RecoverPoint support options and how to quickly access
your Recoverpoint documentation, product support, or online community of users from
within Unisphere for RecoverPoint.
l
RecoverPoint Support..........................................................................................236
Support
235
Support
RecoverPoint Support
Unisphere for RecoverPoint product support is accessed through the Support menu.
RecoverPoint Documentation
Click Support > RecoverPoint Documentation to display the RecoverPoint documentation
on EMC Online Support.
When clicked, the RecoverPoint documentation page is displayed, enabling you to search
for the RecoverPoint documentation that you require by RecoverPoint version, content
type, support task or OS.
236
Support
When clicked, the EMC Online Support page is displayed, enabling you to:
Register your product to access software downloads or obtain and manage license
keys.
Track, view, manage and create service requests for yourself and your company.
View and manage your company information - Sites, products, contacts and
contracts.
Download the new Mobile App to manage and track your Service Requests anytime,
anywhere.
Contact EMC
Learn about EMC's Maintenance, Warranty Information and Parts Return Site.
Learn how to fully leverage the capabilities of the new EMC experience.
Connect with EMC customers and technical experts in this worldwide community of
your peers.
EMC Online Support
237
Support
Submit your ideas for improving serviceability on EMC products. SER is transparent
data repository where all requests can be submitted, managed and tracked.
When clicked, the RecoverPoint community page is displayed, enabling you to join the
community, start a discussion or view feeds.
238
CHAPTER 8
Troubleshooting
This section describes occurrences in RecoverPoint, how to identify them, and how to
mitigate them from a users perspective.
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
l
Troubleshooting
239
Troubleshooting
Licensing RecoverPoint
This section describes how to license new RecoverPoint purchases, and upgrade your
RecoverPoint license.
All RecoverPoint licenses are per array, an XtremIO cluster or an RPA cluster.
Licensing is enforced using the Locking ID.
You cannot add a volume that resides on an unlicensed array to a replication set.
Only volumes that reside on licensed arrays are displayed in the volume list. This
limitation does not exist for journal volumes or repository volumes.
For consistency groups containing both a local copy and a remote copy: If you select
to fail over to the remote copy and the remote RPA cluster does not have enough
licensed replication capacity for two times the capacity of the remote copy, the
failover will fail and you will be prompted to remove the local copy for the failover to
succeed.
When trying to add or modify a group, copy or replication set, the licenses of all
relevant arrays and RPA clusters are checked and the action will fail if it causes any of
the arrays or RPA clusters in the system to exceed their maximum licensed replication
capacity.
In RecoverPoint/CL:
n
Coexist on the same RPA cluster with RecoverPoint/CL licenses. If both are added
to the system, the RecoverPoint/EX license is disabled until the RecoverPoint/CL
license is removed.
License RecoverPoint
RecoverPoint license activation is performed through EMC Online Support at http://
support.emc.com.
1. Immediately upon submission of your sales order, a LAC email is sent to the address
provided during order entry, containing a new License Authorization Code (LAC) for all
of your purchased entitlements. A sales order can contain multiple LACs. In this case,
a separate LAC email is sent for each LAC contained in the sales order.
240
Troubleshooting
2. Click the Click here link in the LAC email to automatically access the RecoverPoint
licensing area of the EMC Online Support site and display all of the entitlements
associated with your LAC.
3. In the RecoverPoint licensing area of the EMC Online Support site, activate and
generate a License File for each entitlement. You will generate a separate license for
each RecoverPoint license model associated with each unique array or RPA cluster.
4. Install your license files on the RecoverPoint system through Unisphere for
RecoverPoint.
Your LAC email(s) (or sales order numbers) to perform Step 1: Quickly access your
entitlements on page 242.
Access to EMC Online Support to perform Step 2 - Activate your entitlements on page
244.
If you do not have Unisphere for RecoverPoint installed, see the EMC RecoverPoint
Installation and Deployment Guide for installation instructions, and install
RecoverPoint before starting this procedure.
Existing EMC Online Support users; enter your EMC Support username and
password.
New EMC Online Support users; click Register Now and complete the registration
process.
2. Select Service Center > Get and Manage Licenses > R > RecoverPoint Family.
3. Click the Activate link in the RecoverPoint version 4.0 and later section to access the
EMC licensing portal.
License RecoverPoint
241
Troubleshooting
4. In the LAC Request screen, click Manage Entitlements to display the Search
Entitlements screen:
242
Troubleshooting
Add raw capacity (for RecoverPoint/EX customers with VMAX 10K arrays with
registered capacity).
Add back-end array replication (for RecoverPoint/EX customers with VPLEX arrays).
In all of these cases, you will need to make a purchase with EMC sales, and obtain a
sales order. As soon as your sales order is approved, a LAC email is automatically sent to
the email addresses provided during order entry containing the LAC (License Authorization
Code) issued to you, validating your purchase and your entitlement(s).
A unique LAC is usually generated and emailed to you for each purchase, but this is not
always the case for evaluation licenses or purchases of certain products. Also, in some
cases (such as the addition of multiple arrays in RecoverPoint/EX), multiple LACs will be
generated and multiple LAC emails will be emailed to you.
To start the licensing process:
l
If you have your LAC email(s), for each LAC, click the Click here link in the LAC email
to automatically access the Powerlink licensing area of EMC Online Support, and
display all entitlements associated with the LAC. Then, activate your entitlements on
page 244.
License RecoverPoint
243
Troubleshooting
Note
If you do not have your LAC email, search your email inbox for an email containing
EMC License Authorization in the subject line. If you still cannot find your LAC email(s),
contact EMC Worldwide Licensing Support at: https://powerlinklicensing.emc.com/
poeticWeb/session/license_request_emc.jsp
l
If you have your sales order number(s), search for entitlements associated with a
sales order on page 241.
Existing EMC Online Support users; enter your EMC Support username and password.
New EMC Online Support users; click Register Now and complete the registration
process.
After you have logged-into EMC Online Support, the Search Entitlements to Activate
screen is displayed. The Search Entitlements to Activate screen is the first screen of a
five screen wizard, that will guide you, step-by-step, through the process of turning your
LACs into license files (redeeming your entitlements).
Procedure
1. In the Search Entitlements to Activate screen:
The link in the LAC email pre-populates the LAC field and searches for all entitlements
associated with the specified LAC. All relevant entitlements are displayed.
Troubleshooting
c. In the Search Machines dialog box, click Add a Machine. The Add Machine dialog
box is displayed.
d. In the Add Machine dialog box, enter a new machine name, and click Save.
A machine name is like a folder, it is used to group items together logically. A
unique machine name must be specified for each entitlement. Machine names can
be whatever unique name you choose but it is best practice to relate the machine
name to the Locking ID. For example, in RecoverPoint/SE and RecoverPoint/EX, the
Locking ID is an array serial number. Therefore, the machine name should be RPAPM00120701240 if APM00120701240 is the array serial number used for the
Locking ID. In RecoverPoint/CL, the Locking ID is the RPA Cluster ID, so the
machine name should be the RPA Cluster ID.
2. In the Register screen, verify the machine name, and click Next.
3. In the Activate screen, enter the Locking ID, and click Next.
The Locking ID is the field that is displayed under the Machine Information column;
its value is whichever entity the license is enforced to.
Depending on the entitlement, the Locking ID can be either an RPA Cluster ID (in
RecoverPoint/CL), or an array serial number (in RecoverPoint/SE and RecoverPoint/
License RecoverPoint
245
Troubleshooting
EX). To display instructions for finding your RPA Cluster IDs and array serial numbers,
either click the Locking ID help link or see Find your RPA cluster IDs on page 267, Find
your XtremIO cluster IDs on page 267 and Find your array serial numbers on page
266.
4. In the Confirm screen, enter the email addresses of the recipients of the license file in
the Email to field of the Additional Email Options section, and click Finish.
By default, the customer contact provided during order entry and the user performing
the entitlement activation are automatically emailed an activation certificate
containing the license file as an attachment. You can enter multiple email addresses
in the Email to field. Separate multiple email addresses with commas. You can also
include optional comments which will be displayed in the certificate e-mail in the
Email comments field, or add optional notes which can only be viewed online in
Powerlink Licensing in the Notes for this transaction section.
5. In the Complete screen, click Save to File to download the license file and save the file
locally. The resulting license file has a *.lic extension and is in plain text format
(can be opened in any text editor).
6. Redo this procedure from Step 1: Quickly access your entitlements on page 242 for
each entitlement in each LAC email or sales order.
246
Troubleshooting
7. After you have turned all of your entitlements into license files, physically transfer the
license file(s) to the computer from which you will be running Unisphere for
RecoverPoint, so you can install them in the RecoverPoint system.
Multiple warnings will be issued before an expiring license is about to expire. After
license expiration, replication continues but no further operations will be allowed on
the RecoverPoint system.
The license limitations and their current values (for example, capacity, expiration) for
each licensed RPA cluster and storage array is displayed in the Dashboard > System
Limits pane.
Adding a new permanent or expiring license with the same Locking ID as an existing
expiring license replaces the existing expiring license.
After you have your license files, launch Unisphere for RecoverPoint as described in the
EMC RecoverPoint Installation and Deployment Guide.
When Unisphere for RecoverPoint loads for the first time The Getting Started wizard on
page 15 is displayed. The Getting Started Wizard will guide you, step-by-step, through the
process of installing your license file(s) in RecoverPoint and enabling RecoverPoint
support. If The Getting Started wizard on page 15 is not displayed, install your license
files using Manage Licenses on page 178 and Configure System Reports and Alerts on
page 226.
When upgrading from RecoverPoint versions prior to 4.0, previous licenses are
automatically converted to the new license format. The new licenses are temporary and
valid for 90 days from the date of upgrade. After that, you must have installed one or
more permanent license files to replicate with RecoverPoint appliances.
Procedure
1. Open a Service Request with EMC Customer Support:
You can open the Service Request yourself or have an EMC representative open the
Service Request for you.
To have an EMC representative open the Service Request for you:
l
Call 24/7 License Key Live Support for North America, EMEA and APJK by dialing
1-800-782-4362, selecting option 4, and selecting option 4 again.
247
Troubleshooting
a. Go to http://support.emc.com
l
Existing EMC Online Support users; when prompted, enter your EMC Support
username and password.
New EMC Online Support users; click Register Now and complete the
registration process.
b. In EMC Online Support, click Service Center in the main toolbar, and then click
Create a Service Request.
c. Fill out the fields in the service request according to the instructions in the
following table:
Field
Value
Service
Select Technical Problem/Question from the drop-down.
Request Type
Company and Product Information
Search by
Site ID
This is the geographical location of the data center for which you are
requesting the license. If you know the site ID, enter it in this field.
If you don't know the site ID:
Expand the Advanced Site Search.
Enter your company name and details.
Click Search.
Select the relevant site ID in the Search Results table.
Note
If you don't see your companys site ID in the list, contact EMC Customer
Support.
Product
Details
Version
Number
Select the version number of the EMC product that you want to upgrade
from the drop-down.
Contact Information
Initial
Contact is
Best Made
By
248
Select Email.
Note
Troubleshooting
Field
Value
Primary
Contact
Name
If the email address/es listed under the primary contact name are incorrect
or missing, edit them to update the contact information.
Phone
If the phone numbers listed under the primary contact name are incorrect
or missing, edit them to update the contact information.
Problem Details
Problem
Severity
Problem
Summary
Problem
Description
All of the array serial numbers of the EMC arrays (VNX, VMAX, VPLEX,
etc.) that require RecoverPoint protection.
d. When youre done filling out the SR details, click the Submit button. An SR
Tracking number is displayed. Write this number down and save it for future
reference.
Note
In most cases, 48 hours after submitting your service request, your RecoverPoint
licenses will be emailed to the specified email address. If you have not received
your RecoverPoint licenses within a month from the time you submitted your
service request, contact EMC Customer Support.
2. Install your RecoverPoint license(s).
When Unisphere for RecoverPoint loads for the first time The Getting Started wizard on
page 15 is displayed. The Getting Started Wizard will guide you, step-by-step, through
the process of installing your license file(s) in RecoverPoint and enabling RecoverPoint
support. If The Getting Started wizard on page 15 is not displayed, install your license
files using Manage Licenses on page 178 and Configure System Reports and Alerts on
page 226.
Upgrade from RecoverPoint versions prior to 4.0
249
Troubleshooting
Process
Americas
EMEA
APJ
Ordering
1-866-EMC-7777> Option 2
Presalessupportcenter@emc.com
Upgrades
1-508-249-5401
License Activation
or Installation
http://support.emc.com
US number: +1-508-249-5401
MajorIf you must move to another major release to upgrade them. For example,
RecoverPoint 3.5, 4.0 and 4.1 are all different major releases of RecoverPoint, and
upgrading from one major release to another requires a major upgrade.
MinorIf they are in the same major release. For example, upgrading to any of the
service packs or patches of RecoverPoint 4.1 are all minor upgrades.
250
RecoverPoint version currently installed at the RPA cluster you are connected to.
RecoverPoint target versionThe target version is the most stable and current
RecoverPoint software code version across all major RecoverPoint releases. Best
practice is to ensure all RPA clusters in your RecoverPoint system are always running
the RecoverPoint target version.
Troubleshooting
You can enable or disable the display of the Upgrade Recommendation dialog box using
the Admin > System Notifications > System Reports and Alerts screen, by clearing or
marking the Enable New Release Notification checkbox. It is enabled by default.
If you connected to RecoverPoint using the management (floating) IP address, note the
relevant cluster name in the Upgrade Recommendation dialog box, as the dialog box is
displayed per RPA cluster.
Learn about EMC's Maintenance, Warranty Information and Parts Return Site.
EMC MatrixThe RecoverPoint EMC Simple Support Matrices (ESSMs) can be found
on EMCs E-lab Web site. E-Lab has tested and qualified millions of different data
center configurations and EMC solutions. To find out if your environment is qualified
for upgrade to the suggested target and recommended versions, download the
relevant RecoverPoint ESSM:
n
251
Troubleshooting
2. In the Set Time Display dialog box, select the radio button of your preferred time
display option.
252
Troubleshooting
NOTICE
Local time is the local time at the RPA that Unisphere for RecoverPoint is connected to.
Results
The time display option you choose will be used by RecoverPoint when performing
operations which require a time stamp such as collecting system information and logging
events.
253
Troubleshooting
Alternatively, you can back up the current production data, manually transfer it to the
remote cluster, and then copy the production image to the copy volumes, where it
becomes the pre-replication image.
The state of data transfer prior to any type of initialization is always paused.
NOTICE
First-time initialization can cause changes in the partition table of the copy volume or
volumes. In a Windows environment, you must clear the OS cache before changing the
partition table of a copy volume. To clear the OS cache, disable the LUN or LUNs on which
the volume resides, and re-enable it. You can do so from the Disk drives interface of the
Windows Device Manager.
You can initialize new consistency groups by creating a backup of your production
volumes, physically transferring them to the remote site, and copying the backup images
onto the remote storage volumes.
During this process, applications at the production site can be running or not. Although
transfer is paused during this process, unless the production host is completely shut
down during the creation and physical transfer of the production image to the remote
site, the host applications keep writing to storage. In this time, the production and copy
volumes become inconsistent, and any writes to production volumes during this process
are subsequently synchronized, upon completion of the process, and start of transfer.
Only synchronizing the changes made to the production volumes during this time results
in a relatively small amount of additional traffic, and takes substantially less time than to
synchronize over IP or Fibre Channel.
254
Troubleshooting
NOTICE
For the selected consistency groups, clearing markers clears all markers of the
selected copy from the production journal volume; that is, it treats the selected copy
as identical to the production source. Caution: To clear markers, the production
source and the selected copy volume must be absolutely identical. If they are not, the
inconsistencies will remain. The clear markers command should be used only with
extreme caution. It is useful when a production source and a copy have been
synchronized manually by initializing from backup and adequate bandwidth is not
available to synchronize using the storage network. Otherwise, the best practice is not
to use this command.
5. Create a block-based backup of the production volumes.
6. Physically transfer the backup to the remote cluster.
7. At the remote RPA cluster, in Unisphere for RecoverPoint:
a. Test a Copy on page 128 to enable image access to the image at the remote RPA
cluster in Logged Accessmode, and enable direct access. Do not select the prereplication image.
If your consistency group contains more than one non-production copy, for all
other copies, the journal is erased and all journal history is lost.
b. Click Finish to close the wizard without disabling image access.
8. Restore the backup onto the remote copy volumes. The backup image becomes the
pre-replication image.
9. In Unisphere for RecoverPoint:
a. Select Recovery > Manage Recovery.
b. Select Finish Testing from the Select Next Action combo box of the accessed copy
at the remote RPA cluster, to disable image access and start transfer to the copy.
Upon start of transfer, the system synchronizes the data of the copy volume with
the corresponding production data.
10. At the remote RPA cluster, if the group contains more than one non-production copy,
Start transfer to a copy on page 113 to all of the other copies.
255
Troubleshooting
Before disabling application regulation, make sure you are familiar with replication
modes and understand the implications of doing so.
256
Use the initialization from backup procedure First-time initialization is taking too
long on page 253.
Add volumes to the copy journal. Note that the additional journal volumes must be
permanent or a full sweep will occur when the volumes are removed.
Troubleshooting
Event number 4133 (Copy regulation has started)is displayed in the event log.
In the consistency group Status tab of the GUI, the Role of a copy becomes Regulated
and is displayed in red.
Release all groups at all copies from this state by running the
unregulate_all_copies command from the CLI.
Check previous event logs. Look for repetitive errors that may indicate a specific
problem in the system.
Check SAN/IP events outside of RecoverPoint, as instabilities may not originate from
RecoverPoint.
If regulation persists, Collect System Information on page 209 and contact EMC
Customer Support for further instruction.
Event 4132 (Copy regulation has ended due to a user action or internal timeout.) is
displayed in the event log.
The Role of a copy is no longer displayed in red in the consistency group Status tab.
257
Troubleshooting
Permanent High-loads - In these cases, RecoverPoint stops and waits for a user action
in order to come out of high load.
Temporary High-loads - In these cases, RecoverPoint tries to recover from the high
load and will keep trying until the condition that triggered the high load changes.
Warning events are logged specifying that the copy is experiencing high load.
In the consistency group or copy Status tab, the transfer state of a copy becomes
High load.
In the Consistency Group Transfer State widget in the Dashboard, a state of Init
(orange) is displayed for the group.
During copy testing in RecoverPoint products with a splitter, if a user accesses a copy
in logged or virtual access modes for a long time and the queue of snapshots waiting
for distribution of the journal reaches its maximum capacity, in this case the system
will Pause Transfer and wait for user input.
When the system is in initialization mode, and the journal volume has reached its
maximum capacity, while the value of the allow_long_resync parameter of the
config_copy_policy CLI command is set to no.
Warning events are logged specifying that the copy is experiencing high load.
The transfer state is displayed as High load. You can display the transfer state:
n
258
Troubleshooting
During copy testing in RecoverPoint products with a splitter, if the user accessed a
copy in logged or virtual access mode for a long time and the queue of snapshots
waiting for distribution of the journal reached its maximum capacity, you should
disable image access or enable direct access according to image access modes.
If the system was in initialization mode, and the journal volume became full, while
the value of the allow_long_resync parameter of the config_copy_policy
CLI command is set to no.
Warning events are logged specifying that the copy is no longer experiencing high
load.
The transfer state is no longer displayed as High load. You can display the transfer
state:
n
When the copy or journal volumes are not fast enough to handle distribution
259
Troubleshooting
minutes and then tries to pause and start transfer again until the required resources are
available.
NOTICE
Warning events are logged specifying that the copy is experiencing high load.
The transfer state is displayed as high load, followed by a progress status. You can
display the transfer state:
n
Warning events are logged specifying that the copy is no longer experiencing high
load.
The transfer state is no longer displayed as High load. You can display the transfer
state:
n
Troubleshooting
If you are connected to an RPA cluster at the production site, note the value of the
Speed of reading from local user volume during
initialization parameter.
If you are connected to a remote RPA cluster, note the value of the Speed of
reading from remote user volume during initialization
parameter.
261
Troubleshooting
The higher the throttling level, the longer initialization will take.
I/O throttling can only be configured using the RecoverPoint CLI or REST API. You
cannot configure I/O throttling using the Unisphere for RecoverPoint GUI.
I/O throttling can only be configured for arrays and vCenter Servers that have been
mapped to, and are therefore seen by, the RPA cluster.
When selecting to configure I/O throttling for all arrays or vCenter Servers seen by an
RPA cluster, the performance of all consistency groups residing on the same array or
vCenter Server is affected. For example, setting the throttling level to high limits the
I/O rate of all RPAs in an RPA cluster to a maximum read-rate of 50 MBps, per array or
vCenter Server.
The higher the throttling level, the longer initialization will take. Ensure that a low
throttling level is insufficient before setting the throttling level to high.
You must be logged into RecoverPoint as an admin user to configure I/O throttling.
To ensure efficiency, RecoverPoint sends I/Os to storage in parallel. The I/O throttling
mechanism regulates parallel I/Os in the following way:
When set to low, the I/O throttling mechanism allows for a maximum of 10 MB of
parallel I/Os per second.
When set to high, the I/O throttling mechanism allows for a maximum of 1 MB of
parallel I/Os per second.
When set to custom, the I/O throttling mechanism allows for a maximum of
<CustomValue>/20 of parallel I/Os. For example, if the custom value is 40 MBps,
the I/O throttling mechanism will allow for 40/20=2 MB of parallel I/Os per
second.
In previous RecoverPoint versions, I/O throttling was only available per RPA cluster.
Therefore:
n
262
Troubleshooting
See the RecoverPoint 4.0 version of the EMC RecoverPoint Administrators Guide
and the EMC RecoverPoint CLI Guide for the I/O throttling settings if at least one
of the RPA clusters in your RecoverPoint system is running a RecoverPoint
version prior to 4.1.
Use the following procedure to enable I/O throttling for a specific array or vCenter Server.
Procedure
1. Run the config_io_throttling command in the RecoverPoint CLI.
2. Select the RPA cluster to which the array or vCenter Server is mapped.
3. Select the array or vCenter Server from the list.
4. Set the throttling level: Set the throttling level to low to limit the I/O rate of the
specified array or vCenter Server to a maximum read-rate of 200 MBps.
l
Set the throttling level to high to limit the I/O rate of the specified array or vCenter
Server to a maximum read-rate of 50 MBps.
Set the throttling level to custom, and specify the custom value in MBps to limit
the I/O rate of the specified array or vCenter Server to any other read-rate.
Set the throttling level to none to disable I/O throttling on the specified array or
vCenter Server.
5. To enable I/O throttling for all arrays or vCenter Servers mapped to an RPA cluster:
a. Run the config_io_throttling command in the RecoverPoint CLI.
b. Select the RPA cluster to which the arrays and/or vCenter Servers are mapped.
c. Scroll down to the bottom of the list of seen arrays and vCenter Servers, and select
the last option in the list.
d. Set the throttling level:
l
Set the throttling level to low to limit the I/O rate of all RPAs in an RPA cluster to a
maximum read-rate of 200 MBps, per array.
Set the throttling level to high to limit the I/O rate of all RPAs in an RPA cluster to a
maximum read-rate of 50 MBps, per array.
Set the throttling level to custom, and specify the custom value in MBps to limit
the I/O rate of all RPAs in an RPA cluster to any other read-rate, per array.
Set the throttling level to none to disable I/O throttling of all RPAs in the specified
RPA cluster.
Results
The read-rate of the RPA on which the consistency group is running is limited to 50 MBps,
200 MBps, or the specified custom setting divided by the number of RPAs in the cluster.
263
Troubleshooting
Replication
Journal
In VNX storage systems, the number of LUNs per storage group is limited. This limit is
typically 256, 512, or 1024, depending on the specific VNX model, as presented in the
EMC RecoverPoint Release Notes.
You calculate in advance the number of LUNs that you expect to need to support the
replication, journal, and repository volumes for your RecoverPoint configuration, and
that number exceeds the number of LUNs currently available.
Troubleshooting
3. Use the Number of virtual ports per port option to create the virtual WWNs at each
site, as follows:
a. Open theSetup > Modify settings > Site-1 details menu.
b. Use the Number of virtual ports per port option to set the desired number of virtual
WWNs.
c. Apply the modified settings.
4. Zone the newly created WWNs:
a. For Brocade switches that support NPIV, enable NPIV and set ports as F_Ports;
otherwise, set ports as L_Ports. For all other switches, every switch port to which a
RecoverPoint Fiber Channel port that uses virtual ports is attached must be
configured as a Fabric Loop port.
b. Create RPA-to-Storage zones with the new WWNs in the same way that existing
WWNs are already zoned.
5. Repeat step 3 on page 265 and step 4 on page 265 for each RPA cluster in your
RecoverPoint system.
Results
The RPAs automatically create new storage groups, and register the new WWNs to those
storage groups.
How can I verify that the storage groups were added successfully?
Upon successful completion of registration (which may take between several minutes
and an hour), the event, Registration of all the site RPAs initiators with the CLARiiON array
is complete., is generated for each site.
The journal is deleted and a full sweep of the consistency group occurs.
How can I verify that the storage groups were added successfully?
265
Troubleshooting
266
Troubleshooting
SiteC:
Splitters:
SYMM- 000194900874
Status: OK
267
Troubleshooting
Index
State
ConnState
ActivationTime
Start-Time
SW-Version PSNT
EncryptionMode
xbrick414
active
connected
Wed Jun 10
17:30:15
2015
Wed Jun 10
17:30:15
2015
4.0.0-54
XIO00150201280
disabled
Figure 13 on page 269 contains some common examples of RecoverPoint licenses. One
license file can include multiple licenses. Each license starts with the word INCREMENT.
268
Troubleshooting
The following table described the variables in the license file, and their possible values.
Table 59 License file variables
Variable
Description
Examples
{Type}
{Prod}
RP.xx.REM.xx
RP.xx.LOC.xx
RP.CL.xxx.xx
RP.SE.xxx.xx
CL for RecoverPoint/CL
RP.EX.xxx.xx
EX for RecoverPoint/EX
SE for RecoverPoint/SE
VMAX
VPLEX
RP.xx.xx.VNX5700
269
Troubleshooting
Variable
Description
l
VNXe3200
{Version}
{Expiration}
Expiring:
- Evaluation: Up to 90 days
Examples
1.0
l
15-dec-2014
permanent
12 (for 12 TB)
{LockingID}
{Capacity}
270
permanent
A System ID
Troubleshooting
Variable
Description
Examples
TB
{Customer}
{Issued}
15-Dec-2014
{Site_info}
{Sign}
271
Troubleshooting
You can use iostat (UNIX) or perfmon (Windows) to determine the value for D data per
second.
The default image access log size is 20%, and it can only be changed using the
RecoverPoint CLI.
See the EMC RecoverPoint Release Notes for the minimum and maximum journal size
limitations.
See the EMC RecoverPoint Release Notes for the minimum and maximum journal size
limitations, when snapshot consolidation is enabled.
For example, if an application has the following requirements:
l
An image access log size that is 20% of the total journal size
10 daily snapshots
2 weekly snapshots
3 monthly snapshots
The minimum size for the journal at this copy would be calculated as (if performance data
was unavailable for the localities of reference):
MinJournalSize = 6
+ { [0.5*(60*60/1024)]
* 12
+ [24 + (10-1)*24*(1-0.20)]
+ [7*24*(1-0.20)+ (2-1)*7*24*(1-0.20)*(1-0.20)]
272
Troubleshooting
+ [7*24*4*(1-0.20)*(1-0.20)+(3-1)*28*24*(1-0.20)*
(1-0.20)*(1-0.20)]
/ (1-0.25)
/ [1-(0.20 + 0.10)]
* (1-0)}
Where:
Table 60 Journal size with snapshot consolidation equation legend
Field
Description
MinJournalSize
SpaceForMarkingAndReplication
Note
Note
273
Troubleshooting
Field
Description
If the past two days-worth of unconsolidated data must
always be available, the value of UnconsolidatedDuration is:
2 * 24Hrs =
48
Note
Note
274
Troubleshooting
Field
Description
Note
275
Troubleshooting
Field
Description
Note
Troubleshooting
Field
Description
1 - %MonthlyLoR, For example: 1 - 0.20 (if
performance data is not available).
Note
spaceAfterImageAccessProcesses The percentage of the journal space that is left after the space
reserved for the logged (%LAProcess) and virtual
(%VAProcess) image access processes is subtracted.
Note
The percentage of the journal space that is left after the space
reserved for the snapshot consolidation process is
subtracted, where the snapshot consolidation process uses
25% of the total journal space.
This value is constant, and is calculated as: 1 - 0.25
spaceAfterCompression
The percentage of the journal space that is left after the space
saved by journal compression is subtracted:
l
277
Troubleshooting
Field
Description
group. The specified values are general estimations, and if
journal compression is used, they should be replaced with
actual values. To obtain actual values, enable the journal
compression setting for a representative period of time
(Warning: both enabling and disabling this setting causes
journal loss), and then Collect System Information on page
209. Send the collected system information to EMC Customer
Support to obtain journal compression values based on the
performance data of the group being replicated.
Note
You can use iostat (UNIX) or perfmon (Windows) to determine the value for data per second.
Configuration issues. If the host replicates data without going through a RecoverPoint
write splitter, as in ESX environments, for example.
278
Periodically
Troubleshooting
You can validate replication integrity periodically Using the periodic integrity
validation tool on page 281 to ensure data consistency between all of the production
and copy volumes in your RecoverPoint system on an ongoing basis.
The integrity check process only runs on the groups primary RPA.
The integrity check process reads all of the data of all of the production and copy
volumes of the group, which can put extra load on the production storage, and then
compares their signatures, which can put extra load on the WAN. The extra load
placed on the WAN may lead to high load or WAN disconnection, which will cause the
integrity check to stop before completing the process on all consistency group
volumes.
How it works
When enabled, the integrity check tool:
1. Reads a section of the groups production and copy volumes.
2. Creates hash signatures of that section of the production and copy volumes.
3. Compares the two signatures.
4. Repeats this process as many times as required across all group volumes.
5. If no inconsistency is found, event 4107 - Integrity check completed successfully, is
logged.
NOTICE
If at any time during this process a possible inconsistency is found, event 4108 - A
possible replication integrity issue has been identified is logged.
The periodic integrity validation tool is only enabled if all RPA clusters in your
RecoverPoint system are running RecoverPoint 4.1 SP1 or later.
To temporarily disable or enable all of the link settings in your entire RecoverPoint
system that were set Using the periodic integrity validation tool on page 281 see Can
I disable or enable integrity validation globally? on page 281.
How the integrity check tool works
279
Troubleshooting
How it works
For each copy whose integrity you want to periodically validate, you will need to run the
config_periodic_integrity_validation CLI command, specify the copy name,
and select a mode of operation.
The following modes are available:
l
Light: In this mode, each RPA will read 1MB every 5 seconds.
Heavy: In this mode, each RPA will read 10MB every 0.5 second.
Note
When using this mode, the maximum degradation in total performance (throughput
and IOPs) should not exceed 10%. However, using this mode is not recommended,
and this mode should not be used without explicit instruction from EMC Customer
Support.
l
Disabled
When enabled, the tool randomly selects an area of the production storage protected by
each consistency group:
1. Each RPA sequentially scans the volumes of the consistency groups that are running
on it (selecting a different group each time) and randomly selects an area of the
storage protected by the group. Each volumes beginning and end receive priority in
the random selection process.
2. If the randomly selected area of a production volume has already been replicated but
has not been written to the target storage yet, this area is not scanned and is
considered consistent.
3. If a possible replication inconsistency is detected, the tool will re-scan the same area
of the production volume to ensure that the results of the first scan are correct.
4. If the second scan detects a possible replication integrity issue, event 4165 is
logged, and a call home event will automatically open a service request with EMC
Customer Support with the relevant consistency group name, volume name and
metadata, while the data itself is written in the RPA logs.
5. If no replication integrity issues are detected no events are logged.
Note
Both integrity validation tools can only be accessed using the RecoverPoint CLI.
280
Troubleshooting
Setting the integrity validation mode to heavy might affect performance. Consult EMC
Customer Support before setting the mode to heavy.
l
281
Troubleshooting
To display whether or not global periodic integrity validation is enabled, run the
get_global_policy CLI command.
Procedure
1. Select Protection > Manage Protection
2. Select a group
3. Click Add Copy and follow the instructions in Add a copy to a group on page 99.
4. Add a standby production copy
Results
The group becomes a MetroPoint group.
Note
Follow the instructions in Remove a copy from a group on page 106 and remove the
standby production copy to turn a MetroPoint group into a regular group.
282
CHAPTER 9
Events
This section describes all of the events issued by the RecoverPoint system.
l
l
l
Normal Events.....................................................................................................284
Detailed events................................................................................................... 294
Advanced events.................................................................................................330
Events
283
Events
Normal Events
The following table contains the Normal scope events that are issued by the RecoverPoint
system.
Table 61 Normal scope events
ID
Topic
Level
Summary
More Details
User Action
1002
Mgmt
Info
None
1010
Mgmt
Warning
1012
Mgmt
Warning
License grace period expires in less than <expiration interval> days. You
must obtain a new RecoverPoint
license.
1013
Mgmt
Error
License expired
None
1021
RPA
Error
None
2000
RPA
Cluster
Info
Cluster management
running on RPA
None
3002
RPA
Warning
Cluster management
switched over to RPA
None
3007
RPA
Warning
off
RPA is up
None
3014
RPA
Warning
None
3022
RPA
Warning
off
None
3023
RPA
Warning
None
3155
Group
Info
None
3156
Group
Info
None
3170
Mgmt
Info
None
3171
Mgmt
Info
None
4000
Group
Info
Group capabilities OK
None
284
Events
ID
Topic
Level
Summary
More Details
User Action
4001
Group
Warning
None
4003
Group
Error
Group capabilities
problem
None
4007
Group
Info
None
4008
Group
Warning
4009
Group
Error
None
4010
Group
Info
None
4015
Group
Info
Transferring latest
snapshot
4016
Group
Warning
Transferring latest
snapshot
4017
Group
Error
Transferring latest
snapshot
4018
Group
Warning
Transfer of latest
snapshot complete
4019
Group
Warning
4020
Group
Warning
off
None
4021
Group
Error
Initialization paused
4022
Group
Error off
Initialization resumed
None
4023
Group
Error
Transfer paused
4024
Group
Error off
Transfer restarted
None
Normal Events
285
Events
ID
Topic
Level
Summary
More Details
User Action
4025
Group
Warning
4026
Group
Warning
off
None
4027
Group
Error
4028
Group
Error off
None
4040
Group
Error
Journal error
4041
Group
Info
None
4042
Group
Info
None
4043
Group
Warning
None
4044
Group
Error
None
4051
Group
Info
Resuming distribution
4054
Group
Error
4057
Group
Error
4062
Group
Info
None
4063
Group
Warning
None
4064
Group
Error
None
4080
Group
Warning
None
4081
Group
Warning
off
None
4084
Group
Info
Markers cleared
None
4085
Group
Warning
None
4086
Group
Info
Synchronization started
None
4087
Group
Info
Synchronization
completed
None
4091
Group
Error
286
Events
ID
Topic
Level
Summary
More Details
User Action
automatically undone.
Alternatively, use the undo writes
command to undo the same writes;
image access remains enabled.
- If, however, you wish to retain the
writes that were added to the copy
image while image access has been
enabled, you must increase the size
of the copy journal by adding one or
more volumes to the journal.
Alternatively, you can set the image
access mode to direct; however, in
that case, the copy journal is
erased, and a full sweep
resynchronization will be required
to restore consistency between the
production and copy images.
- To help prevent this problem from
recurring, increase the size of your
image access log, using one or both
of the following:
- - Add volumes to the journal.
- - Modify the policy setting for the
portion of the journal allocated to
the image access log. This is
permitted only when image access
is disabled.
4095
Group
Info
4097
Group
Warning
Starting three-phase
distribution
4098
Group
Warning
off
Normal Events
287
Events
ID
Topic
Level
Summary
More Details
User Action
4099
Group
Warning
Starting long
initialization
None
4110
Group
Info
None
4111
Group
Info
None
4112
Group
Info
4113
Group
Info
None
4114
Group
Info
4115
Group
Error
4116
Group
Error
4118
Group
Error
None
4119
RPA
Error
None
4120
Group
Warning
4122
Group
Error off
4124
Group
Error off
4129
Group
Warning
4130
Group
Warning
off
4135
Group
Info
Copy entered
maintenance mode
4136
Group
Info
4137
Group
Info
Snapshot consolidation
has been successful
288
None
Events
ID
Topic
Level
Summary
More Details
User Action
4138
Group
Warning
Snapshot consolidation
failed
None
4140
Group
Info
None
4141
Group
Info
Snapshot consolidation
policy change
4142
Group
Info
Snapshot consolidation
request registered
None
4156
Group
Warning
4159
Group
Info
4160
Group
Info
None
4161
Group
Info
Short initialization
started
4162
Group
Info
4174
RPA
Cluster
Info
4210
RPA
Cluster
Warning
VM no longer being
replicated
None
4211
RPA
Cluster
Warning
VM partially replicated
None
4212
RPA
Cluster
Info
VM is fully replicated
None
4213
RPA
Cluster
Error
None
4300
RPA
Cluster
Warning
4301
RPA
Warning
None
4302
Group
Warning
Journal is unable to
handle incoming data
rate
None
4303
Group
Warning
None
289
Events
ID
Topic
Level
Summary
More Details
User Action
unable to handle
incoming data rate
4304
Group
Warning
Remote storage is
unable to handle
incoming data rate;
regulating distribution
4305
Group
Warning
4306
RPA
Cluster
Warning
This may increase RPO, and cause a If this event recurs, examine the
high-load state.
WAN/FC link for possible high
latency or packet loss. Consult
your network administrator if
needed.
4307
RPA
Cluster
Warning
4308
RPA
Cluster
Warning
4309
RPA
Warning
4310
Group
Warning
4312
Group
Error
Switching to virtual
access
290
Events
ID
Topic
Level
Summary
More Details
4400
RPA
Cluster
Warning
off
None
4401
RPA
Warning
off
None
4402
Group
Warning
off
Journal handles
incoming data rate
successfully
None
4403
Group
Warning
off
None
4404
Group
Warning
off
4405
Group
Warning
off
None
4406
RPA
Cluster
Warning
off
None
4407
RPA
Cluster
Warning
off
4408
RPA
Cluster
Warning
off
None
4409
RPA
Warning
off
None
4410
Group
Warning
off
4412
Group
Error off
None
5013
Splitter
Error
Splitter is down
None
5014
Splitter
Info
Writes to replication
volumes disabled, reads
are allowed
None
5015
Splitter
Error off
Splitter is up
None
User Action
Normal Events
291
Events
ID
Topic
Level
Summary
More Details
5016
Splitter
Warning
None
5017
Splitter
Error off
Splitter version is
supported
None
5018
Splitter
Error
None
5019
Splitter
Warning
Writes to replication
volumes disabled, reads
are allowed
None
5020
Splitter
Error
Writes to replication
volumes disabled, reads
are allowed
None
5029
Splitter
Error
5030
Splitter
Error
None
5031
Splitter
Warning
5032
Splitter
Info
Splitter splitting to
replication volumes
None
5035
Splitter
Info
Writes to replication
volumes disabled
None
5036
Splitter
Warning
Writes to replication
volumes disabled
None
5037
Splitter
Error
Writes to replication
volumes disabled
None
5038
Splitter
Info
None
5039
Splitter
Warning
None
5040
Splitter
Error
None
5041
Splitter
Info
None
5042
Splitter
Warning
None
5043
Splitter
Error
None
5045
Group
Warning
5046
Splitter
Warning
292
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
determine if the problem recurs.
- If the problem persists, or
increases in frequency, contact
EMC Customer Support .
5052
Splitter
Error
5053
Group
Error off
5059
Splitter
Info
5060
Splitter
Info
5061
Splitter
Info
7111
RPA
Cluster
Error
Volumes switched on
storage
7112
Splitter
Error
Volumes switched on
storage
9999
RPA
Info
Test event
None
18036
RPA
Error
Negotiation of transfer
protocol failed again
Normal Events
293
Events
Detailed events
The following table contains the Detailed scope events that are issued by the
RecoverPoint system.
Table 62 Detailed scope events
ID
Topic
Level
Summary
More Details
1000
Mgmt
Info
User logged in
None
1001
Mgmt
Warning
None
1003
Mgmt
Warning
None
1004
Mgmt
Warning
1005
Mgmt
Warning
1006
Mgmt
Info
Settings changed
None
1007
Mgmt
Info
None
1008
Mgmt
Info
None
1009
Mgmt
Info
None
1011
Mgmt
Error
1014
Mgmt
Info
User bookmarked an
image
None
1017
Mgmt
Warning
1018
Mgmt
Warning
off
RPA multipathing
problem fixed
None
1019
Mgmt
Warning
None
1020
Mgmt
Warning
None
294
User Action
Events
ID
Topic
Level
Summary
More Details
1031
Mgmt
Warning
None
1032
Mgmt
Info
None
1033
Mgmt
Warning
None
1034
Mgmt
Info
None
1035
Mgmt
Error
None
1036
Mgmt
Info
None
3000
RPA
Warning
off
RPA successfully
communicating with
cluster
None
3001
RPA
Warning
RPA problem
communicating with
cluster
3005
RPA
Cluster
Error
3006
RPA
Cluster
Error off
3008
RPA
Warning
None
3030
RPA
Warning
None
3036
RPA
Error
None
3037
RPA
Error off
3038
RPA
Cluster
Info
Director automatically
added
None
3040
RPA
Cluster
Info
None
3041
RPA
Cluster
Info
None
3157
Group
Error
3158
Group
Error off
3159
RPA
Cluster
Error
User Action
Detailed events
295
Events
ID
Topic
Level
Summary
More Details
User Action
3160
Group
Error
None
3161
Group
Error
3162
Group
Error
None
3163
Group
Error
None
4056
Group
Error
No image in journal
matches query
None
4078
Group
Info
None
4082
Group
Warning
4083
Group
Warning
4090
Group
Warning
296
Events
ID
Topic
Level
Summary
More Details
User Action
recurring, increase the size of your
image access log, using one or both
of the following:
- - Add volumes to the journal.
- - Modify the policy setting for the
portion of the journal allocated to
the image access log. This is
permitted only when image access
is disabled.
4106
Group
Warning
4107
Group
Info
Replication integrity
check successful
None
4108
Group
Error
Replication integrity
issue detected
4109
Group
Error
Replication integrity
check stopped before it
finished
4117
Group
Warning
4121
Group
Error
4123
Group
Error
4125
Group
Error
Journal capacity
insufficient
4126
Group
Error off
Journal capacity
sufficient
Detailed events
297
Events
ID
Topic
Level
Summary
More Details
4127
Group
Warning
Predicted journal
capacity insufficient
4128
Group
Warning
off
Predicted journal
capacity sufficient
None
4131
Group
Warning
Transfer paused or
synchronizing for
unusually long time
None
4132
Group
Warning
off
Transfer resumed
4133
Group
Error
4134
Group
Error off
4139
Splitter
Warning
Storage unreachable
4158
Group
Warning
Journal capacity
extended
4163
Group
Error
Snap-based replication
has been disabled
298
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
4164
Group
Error off
Snap-based replication
has been restored
4165
Group
Error
4166
Group
Error
Replication integrity
check failed to run
Replication integrity check failed to Wait for the current integrity check
run because another integrity check to end, or stop the current process.
is already running on the same RPA.
4167
Group
Error
Replication integrity
check stopped before it
finished
4175
RPA
Info
No action required.
4176
RPA
Cluster
Info
No action required.
4177
RPA
Cluster
Info
No action required.
4178
RPA
Info
No action required.
4179
RPA
Info
4180
RPA
Cluster
Info
No action required.
4181
RPA
Cluster
Info
No action required.
4182
RPA
Info
No action required.
4183
RPA
Info
No action required.
4184
RPA
Info
No action required.
4185
RPA
Cluster
Info
No action required.
Detailed events
299
Events
ID
Topic
Level
Summary
More Details
User Action
4186
RPA
Cluster
Info
No action required.
4230
RPA
Cluster
Info
4231
RPA
Info
4232
RPA
Cluster
Info
4233
RPA
Cluster
Info
4311
Group
Info
Load balancing
recommendation
None
4501
Mgmt
Warning
License invalid in
RecoverPoint
4502
Mgmt
Warning
License invalid in
RecoverPoint/SE
300
Events
ID
Topic
Level
Summary
More Details
User Action
Manager Converter Wizard, 2)
upgrade the existing
RecoverPoint/SE license to a
RecoverPoint license.
5008
Splitter
Warning
None
5010
Splitter
Warning
Splitter stopped
5011
Splitter
Info
Splitter stopped
5012
Splitter
Warning
Splitter stopped
5050
Splitter
Warning
None
5051
Splitter
Warning
Unregistered array or
vCenter Server found
5054
Group
Warning
Consistency group is
configured with a LUN
greater than 2 TB and a
VNX/CLARiiON splitter
version that does not
support the LUN.
None
5055
Group
Warning
off
None
5056
Splitter
Warning
None
5057
Group
Warning
No action required.
Detailed events
301
Events
ID
Topic
Level
Summary
More Details
User Action
5058
Group
Warning
off
Volume configuration
Replication set volume
supported by VNX/
configuration is now supported by
CLARiiON splitter version the VNX/CLARiiON splitter version
installed on the system.
6000
Group
Error
Image cannot be
accessed
6001
Group
Error off
8000
Mgmt
Error
Calling home
None
8001
Mgmt
Error
None
8002
RPA
Cluster
Info
VM created
None
8003
RPA
Cluster
Info
8004
RPA
Cluster
Info
None
8005
RPA
Cluster
Info
None
8101
RPA
Cluster
Info
None
8102
RPA
Cluster
Info
Array provider
unregistered
None
8103
RPA
Cluster
Info
None
8104
RPA
Cluster
Info
Storage was
unregistered
None
8105
RPA
Cluster
Warning
Lost connectivity to
storage
None
8106
RPA
Cluster
Info
Restored connectivity to
storage
None
8107
RPA
Cluster
Info
None
302
Events
ID
Topic
Level
Summary
More Details
User Action
8108
RPA
Cluster
Info
None
8200
Group
Info
None
8201
Group
Info
Snap-based replication
is done
None
8202
Group
Info
None
8203
Group
Error
None
8204
Group
Error
None
8205
Group
Error
9998
RPA
Info
None
10203
RPA
Error off
None
10206
RPA
Brief
error
Internal process
restarted
None
10207
RPA
Brief
error
Internal process
restarted
None
10210
RPA
Error
10211
RPA
Error
SAN communication
problem between
splitters and RPAs
existed but has resolved
itself
None
10212
RPA
Error off
10213
RPA
Error off
Detailed events
303
Events
ID
Topic
Level
Summary
More Details
10216
RPA
Brief
error
Internal process
restarted
None
10501
RPA
Info
Synchronization
complete
None
10502
RPA
Info
10503
RPA
Error
Transferring latest
snapshot
10504
RPA
Info
Access to image
disabled
10505
RPA
Info
None
10506
RPA
Info
10507
RPA
Info
10508
RPA
Info
Data flushed from source All data has been flushed from the
RPA
source RPA. Failover will proceed.
10509
RPA
Info
10510
RPA
Info
Following a pause
None
transfer system now
cleared to restart transfer
10511
RPA
Info
Finished recovering
replication backlog
10512
RPA
Info
Following a pause
None
transfer system now
cleared to restart transfer
12000
RPA
Error
None
12001
RPA
Error
Splitter is down
None
12002
RPA
Error
None
304
User Action
None
None
Events
ID
Topic
Level
Summary
More Details
User Action
that RecoverPoint configuration
matches the new network
configuration.
- - If none of the above instructions
resolve this issue, collect system
information from all clusters
experiencing connectivity issues,
and contact EMC Customer Service.
-
12003
RPA
Error
None
12004
RPA
Error
Error in data link to other Error in data link. All RPAs at cluster
cluster(s)
are unable to transfer replicated
data to other cluster(s) due to
communication failure over the
WAN link. Data transfer between
RPA clusters has stopped.
12005
RPA
Error
None
12006
RPA
Error
RPA is disconnected
from the RPA cluster
None
12007
RPA
Error
None
12008
RPA
Error
RPA is down
None
12009
RPA
Error
Detailed events
305
Events
ID
Topic
Level
Summary
More Details
User Action
12010
RPA
Error
12011
RPA
Error
306
Events
ID
Topic
Level
Summary
More Details
User Action
the image access log. This is
permitted only when image access
is disabled.
12012
RPA
Error
None
12013
RPA
Error
12014
RPA
Error
12016
RPA
Error
12022
RPA
Error
12023
RPA
Error
12024
RPA
Error
12025
RPA
Error
12026
RPA
Error
12027
RPA
Error
12029
RPA
Error
12030
RPA
Error
12031
RPA
Error
None
Detailed events
307
Events
ID
Topic
Level
Summary
More Details
User Action
12032
RPA
Cluster
Error
None
12033
RPA
Error
12034
RPA
Error
None
12035
RPA
Error
12036
RPA
Error
Negotiation of transfer
protocol failed
12037
RPA
Error
12038
RPA
Error
12039
RPA
Warning
Long initialization
started
None
12040
RPA
Error
None
12041
RPA
Error
12043
RPA
Error
None
12044
RPA
Error
12045
RPA
Error
None
12046
RPA
Error
None
308
Events
ID
Topic
Level
Summary
More Details
12047
RPA
Error
None
12048
RPA
Error
Unsupported splitter
version
None
12049
RPA
Info
None
12050
RPA
Error
RecoverPoint has
None
dynamically started
replicating
asynchronously to one of
the replicas of this
group. The group will
now be initialized.
During initialization data
is not transferred
synchronously
12057
RPA
Cluster
Info
Replication volume
reservation conflict
12058
RPA
Error
RPA to splitter
communication error
None
12059
RPA
Error
RPA communication
problem with volumes
12060
RPA
Error
RPA communication
problem with journal
volumes
None
12061
RPA
Error
RPA communication
problem with replication
volumes
None
12062
RPA
Error
RPA communication
problem with replication
volume
None
12063
RPA
Error
RPA communication
problem with journal
volume
None
12072
RPA
Error
12073
RPA
Error
RPA communication
None
problems with repository
volume
12074
RPA
Error
User Action
None
Detailed events
309
Events
ID
Topic
Level
Summary
More Details
12075
RPA
Cluster
Error
None
12076
RPA
Cluster
Error
None
12077
RPA
Cluster
Error
None
12078
RPA
Error
Splitter communication
error
12080
RPA
Error
Communications
problem in internal
process
12081
RPA
Error
Communications
problem in internal
process
12082
RPA
Error off
Communications
problem in internal
process
12083
RPA
Error
Communications with
Communications with Symmetrix
Symmetrix director failed director has failed repeatedly.
12085
Mgmt
Info
User logged in
310
None
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
12086
RPA
Warning
None
12087
RPA
Warning
None
12088
Array
Error
None
None
12089
Array
Error
None
None
12090
Site
Error
None
None
12091
Site
Error
ESX is down
None
None
12092
Group
Error
None
None
12093
Group
Error
None
None
12094
Group
Error
VM is powered down
None
None
12095
Site
Error
None
None
12096
Site
Error
None
None
12097
Site
Error
None
None
12098
Site
Error
None
None
14001
RPA
Error off
14002
RPA
Error off
None
14003
RPA
Error off
None
14004
RPA
Error off
None
14005
RPA
Error off
None
Detailed events
311
Events
ID
Topic
Level
Summary
More Details
User Action
able to transfer
replicated data to other
cluster
14006
RPA
Error off
14007
RPA
Error off
14008
RPA
Error off
RPA is up
None
14009
RPA
Error off
14010
RPA
Error off
None
14011
RPA
Error off
None
14012
RPA
Error off
None
312
None
Events
ID
Topic
Level
Summary
More Details
14013
RPA
Error off
No longer trying to
access a diluted image
None
14014
RPA
Error off
14016
RPA
Error off
14022
RPA
Error off
14023
RPA
Error off
14024
RPA
Error off
14025
RPA
Error off
14026
RPA
Error off
14027
RPA
Error off
14029
RPA
Error off
14030
RPA
Error off
14031
RPA
Error off
14032
RPA
Cluster
Error off
None
14033
RPA
Error off
Access to volume
restored
14034
RPA
Error off
Replication consistency
to storage restored
14035
RPA
Error off
User Action
Detailed events
313
Events
ID
Topic
Level
Summary
More Details
14036
RPA
Error off
Negotiation of transfer
protocol successful
again
14037
RPA
Error off
None
14038
RPA
Error off
None
14039
RPA
Warning
off
Long initialization
completed
None
14040
RPA
Error off
None
14041
RPA
Error off
None
14042
RPA
Error off
Synchronization in
progress to restore any
failed writes in group
None
14043
RPA
Error off
Synchronization in
progress to restore any
failed writes
None
14044
RPA
Error off
14045
RPA
Error off
14046
RPA
Error off
None
14047
RPA
Error off
None
14049
RPA
Info
RPA is out of
maintenance mode
None
14050
RPA
Error off
RecoverPoint has
None
dynamically resumed
synchronous replication
to one of the replicas of
this group. The group will
now be initialized.
314
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
RPA
Cluster
Info
Group volumes
reservation conflicts
were fixed
None
14058
RPA
Error off
None
14059
RPA
Error off
End of connectivity
problems between all
group volumes and RPA
None
14060
RPA
Error off
End of connectivity
None
problems between group
journal volumes and RPA
14061
RPA
Error off
End of connectivity
None
problems between group
replication volumes and
RPA
14062
RPA
Error off
End of connectivity
None
problems between group
replication volume and
RPA
14063
RPA
Error off
Connectivity problems
with group journal
volume and RPA were
fixed
14072
RPA
Error off
14073
RPA
Error off
Connectivity between
repository volume and
RPA restored
None
14074
RPA
Error off
None
14075
RPA
Cluster
Error off
None
14076
RPA
Cluster
Error off
None
14077
RPA
Cluster
Error off
None
None
Detailed events
315
Events
ID
Topic
Level
Summary
More Details
User Action
14078
RPA
Error off
End of splitter
communication error
14080
RPA
Error off
Fix of communications
problem in internal
process
None
14081
RPA
Error off
Internal process
communication problem
has been fixed
None
14082
RPA
Error off
Fix of communications
problem in internal
process
None
14083
RPA
Error off
Communication with
Symmetrix director
restored
14086
RPA
Warning
off
None
14087
RPA
Warning
off
None
14088
Array
Error off
None
None
14089
Array
Error off
None
None
14090
Site
Error off
None
None
14091
Site
Error off
ESX is up
None
None
14092
Group
Error off
None
None
14093
Group
Error off
None
None
14094
Group
Error off
VM is powered up
None
None
14095
Site
Error off
None
None
14096
Site
Error off
None
None
316
Events
ID
Topic
Level
Summary
More Details
User Action
14097
Site
Error off
None
None
14098
Site
Error off
None
None
16000
RPA
Brief
error
None
16001
RPA
Brief
error
16002
RPA
Brief
error
16003
RPA
Brief
error
16004
RPA
Brief
error
Brief error in data link to Error in data link. All RPAs at cluster
other cluster(s) corrected are unable to transfer replicated
data to other cluster(s). Problem
has been corrected.
16005
RPA
Brief
error
None
16006
RPA
Brief
error
None
16007
RPA
Brief
error
16008
RPA
Brief
error
16009
RPA
Brief
error
Link was in high load but Due to heavy I/O activity, a link
has now returned to
entered a high load state in order to
normal operation
prevent I/O failures on that link.
The link has since exited the high
load state, and has returned to
normal operation. The following are
among the possible causes of the
high load: RPA is unable to handle
the large volume of incoming data.
None
If high load persists, consider
running the balance_load
command and applying the load
balancing recommendation, or
manually modifying the preferred
RPA of each group according to the
recommendation. Check for
scheduled activities in your
environment. When schedule
Detailed events
317
Events
ID
Topic
Level
Summary
More Details
User Action
permits, run
detect_bottlenecks for the
consistency group in which the high
load condition was detected. If
relevant, consider enabling fast
first-time initialization (for details,
see RecoverPoint Administrators
Guide).
16010
RPA
Brief
error
None
16011
RPA
Brief
error
16012
RPA
Brief
error
16013
RPA
Brief
error
None
16014
RPA
Brief
error
16016
RPA
Brief
error
16022
RPA
Brief
error
16023
RPA
Brief
error
None
16024
RPA
Brief
error
318
Events
ID
Topic
Level
Summary
More Details
16025
RPA
Brief
error
16026
RPA
Brief
error
16027
RPA
Brief
error
16029
RPA
Brief
error
16030
RPA
Brief
error
16031
RPA
Brief
error
16032
RPA
Cluster
Brief
error
16033
RPA
Brief
error
Brief volume
accessibility error
corrected
16034
RPA
Brief
error
16035
RPA
Brief
error
16036
RPA
Brief
error
Negotiation of transfer
protocol successful
again
16037
RPA
Brief
error
User Action
Detailed events
319
Events
ID
Topic
Level
Summary
More Details
16038
RPA
Brief
error
16039
RPA
Info
None
16040
RPA
Brief
error
None
16041
RPA
Brief
error
None
16042
RPA
Brief
error
None
16043
RPA
Brief
error
None
16044
RPA
Brief
error
None
16045
RPA
Brief
error
None
16046
RPA
Brief
error
None
16047
RPA
Brief
error
16048
RPA
Brief
error
Brief unsupported
splitter version error
corrected
16049
RPA
Info
None
16050
RPA
Error
RecoverPoint had
dynamically resumed
None
320
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
synchronous replication
to one of the replicas of
this group but has since
started replicating
asynchronously again.
Consequentially the
group has been
initialized twice. During
initialization data was
not transferred
synchronously. If this is
not the expected
behavior contact EMC
Customer Support
16057
RPA
Cluster
Info
Brief reservation
conflicts on group
volumes
None
16058
RPA
Brief
error
Brief connectivity
None
problem between splitter
and RPA
16059
RPA
Brief
error
Brief connectivity
problem between all
group volumes and RPA
16060
RPA
Brief
error
Brief connectivity
None
problem between group
journal volumes and RPA
16061
RPA
Brief
error
Brief connectivity
problem between group
replication volumes and
RPA
None
16062
RPA
Brief
error
Brief connectivity
problem between group
replication volume and
RPA
None
16063
RPA
Brief
error
Brief connectivity
problem between group
journal volume and RPA
None
16072
RPA
Brief
error
16073
RPA
Brief
error
Brief connectivity
problem between
repository volume and
RPA
None
None
Detailed events
321
Events
ID
Topic
Level
Summary
More Details
16074
RPA
Brief
error
None
16075
RPA
Cluster
Brief
error
None
16076
RPA
Cluster
Brief
error
None
16077
RPA
Cluster
Brief
error
None
16078
RPA
Brief
error
Brief splitter
communication error
16080
RPA
Brief
error
Internal process
communication problem
16081
RPA
Brief
error
Internal process
communication problem
16082
RPA
Brief
error
Internal process
communication problem
briefly resolved
16083
RPA
Brief
error
Communications with
Symmetrix director
restored again
16086
RPA
Warning
off
None
16087
RPA
Warning
off
None
16088
Array
Brief
error
None
None
16089
Array
Brief
error
None
None
322
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
16090
Site
Brief
error
None
None
16091
Site
Brief
error
None
None
16092
Group
Brief
error
None
None
16093
Group
Brief
error
None
None
16094
Group
Brief
error
None
None
16095
Site
Brief
error
None
None
16096
Site
Brief
error
None
None
16097
Site
Brief
error
None
None
16098
Site
Brief
error
None
None
18001
RPA
Error
None
18002
RPA
Error
18003
RPA
Error
None
18004
RPA
Error
Detailed events
323
Events
ID
Topic
Level
Summary
18005
RPA
Error
18006
RPA
Error
None
18007
RPA
Error
None
18008
RPA
Error
None
18009
RPA
Error
18010
RPA
Error
18011
RPA
Error
18012
RPA
Error
None
18013
RPA
Error
None
18014
RPA
Error
18016
RPA
Error
324
More Details
User Action
Events
ID
Topic
Level
Summary
More Details
18022
RPA
Error
18023
RPA
Error
18024
RPA
Error
18025
RPA
Error
18026
RPA
Error
None
18027
RPA
Error
18029
RPA
Error
18030
RPA
Error
18031
RPA
Error
None
18032
RPA
Cluster
Error
None
User Action
Detailed events
325
Events
ID
Topic
Level
Summary
More Details
18033
RPA
Error
None
18034
RPA
Error
Replication consistency
in writes to storage and
writes to RPAs was
temporarily restored but
problem may have
returned
None
18035
RPA
Error
18037
RPA
Error
18038
RPA
Error
18039
RPA
Warning
None
18040
RPA
Error
None
18041
RPA
Error
Problem writing to
volume was corrected,
but has recurred
None
18042
RPA
Error
Synchronization had
None
restored any failed writes
in group but problem has
returned
18043
RPA
Error
Internal problem
18044
RPA
Error
326
None
User Action
Events
ID
Topic
Level
Summary
More Details
18045
RPA
Error
18046
RPA
Error
None
18047
RPA
Error
None
18049
RPA
Info
None
18050
RPA
Error off
RecoverPoint had
dynamically resumed
synchronous replication
to one of the replicas of
this group but has since
started replicating
asynchronously again.
Consequentially the
group has been
initialized twice. During
initialization data was
not transferred
synchronously. If this is
not the expected
behavior contact EMC
Customer Support
None
18057
RPA
Cluster
Info
Reservation conflicts
from group replication
volumes were briefly
fixed
None
18058
RPA
Error
Splitter to RPA
connectivity error has
returned
None
18059
RPA
Error
Connectivity problems
between all group
volumes and RPA were
briefly corrected
None
18060
RPA
Error
Connectivity problems
between group journal
volumes and RPA were
briefly corrected
None
User Action
Detailed events
327
Events
ID
Topic
Level
Summary
More Details
18061
RPA
Error
Connectivity problems
between group user
volumes and RPA were
briefly corrected
None
18062
RPA
Error
Connectivity problems
between group user
volume and RPA were
briefly corrected
None
18063
RPA
Error
Connectivity problems
between group journal
volume and RPA were
briefly corrected
None
18072
RPA
Error off
18073
RPA
Error
Connectivity between
repository volume and
RPA restored
None
18074
RPA
Error
18075
RPA
Cluster
Error
None
18076
RPA
Cluster
Error
None
18077
RPA
Cluster
Error
None
18078
RPA
Error
Splitter communication
error returned
18080
RPA
Error
Internal process
communication problem
328
User Action
Events
ID
Topic
Level
Summary
More Details
User Action
18081
RPA
Error
Internal process
communication problem
18082
RPA
Error
Internal process
communication problem
18083
RPA
Error
Communication with
After a brief recovery,
Symmetrix director failed communications with a Symmetrix
again
director has failed again.
18086
RPA
Brief
warning
18087
RPA
Brief
warning
None
18088
Array
Error
None
None
18089
Array
Error
None
None
18090
Site
Error
None
None
18091
Site
Error
None
None
18092
Group
Error
None
None
18093
Group
Error
None
None
18094
Group
Error
VM was powered up
temporarily
None
None
18095
Site
Error
None
None
18096
Site
Error
None
None
Detailed events
329
Events
ID
Topic
Level
Summary
More Details
User Action
18097
Site
Error
None
None
18098
Site
Error
None
None
Advanced events
The following table contains the Normal scope events that are issued by the RecoverPoint
system.
Table 63 Advanced scope events
ID
Topic
Level
Summary
More Details
2004
RPA
Cluster
Info
Repository volume
created
None
2005
RPA
Cluster
Info
Repository volume
removed
None
2006
RPA
Cluster
Info
Splitter(s) added
None
2007
RPA
Cluster
Info
Splitter(s) removed
None
3003
RPA
Warning
Stopping a system
process
None
3004
RPA
Info
Starting a system
process
None
3009
RPA
Warning
A system process
stopped
None
3010
RPA
Warning
A system process
stopped
None
3031
RPA
Warning
An internal process
restarted
None
3032
RPA
Info
An internal process
restarted
None
3034
RPA
Info
Negotiating transfer
protocol
None
3035
RPA
Info
An internal process
restarted
None
4005
Group
Info
Negotiating transfer
protocol
None
330
User Action
Events
ID
Topic
Level
Summary
More Details
4013
RPA
Info
Negotiating transfer
protocol
None
4013
RPA
Info
Negotiating transfer
protocol
None
4014
Group
Info
Negotiating transfer
protocol
None
4050
Group
Info
4052
Group
Warning
4072
Group
Info
Journal cleared
None
4073
Group
Warning
Journal cleared
None
4074
Group
Error
Journal cleared
None
4075
Group
Info
Journal available
None
4076
Group
Info
Adding volume(s)
None
4077
Group
Info
Removing volume(s)
None
4092
Group
Info
Accessing image
4093
Group
Info
None
4094
Group
Info
None
4096
Group
Info
None
4100
RPA
Cluster
Info
Group created
4101
RPA
Cluster
Info
Group removed
None
4102
Group
Info
Journal volume(s)
removed
None
4103
Group
Info
None
4104
Group
Info
None
4105
Group
Info
5000
Splitter
Info
Volume(s) attached to
splitter(s)
5001
Splitter
Info
User Action
None
Advanced events
331
Events
ID
Topic
Level
Summary
More Details
5049
Splitter
Warning
None
10000
RPA
Info
Analyzing changes in
system
None
10001
RPA
Info
System is stable
10002
RPA
Info
Issuing intermediate
report
10101
RPA
Error
Unrecognised system
activity
10102
RPA
Info
Internal changes
occurred
10201
RPA
Info
None
10202
RPA
Info
12042
RPA
Error
332
User Action