Replication Configuration

Topics | How To | Related Topics


Overview

Replication Scenario

Throttling

Orphan Files

Fan-In Recovery Points

Best Practices


Overview

Workstation Backup Agent uses ContinuousDataReplicator on the destination computer to manage the backup data secured from the Workstation Agent source. Managing the backup data includes, creating recovery points to access point-in-time data, and back up the recovery points for future access. This document explains the configurations required in the destination computer and other replication options required for the successful data protection operations using Workstation Backup Agent.


Replication Scenario

Workstation Backup source computers are configured to the destination computer in a Fan-In configuration setup.

Fan-In: Replication from multiple Source computers to a single Destination computer:

In a Fan-In configuration, multiple computers on the LAN or WAN have their data replicated to a single computer, either local or remote. This provides protection of all of the source computers against catastrophic failure, while maximizing the use of resources by directing all the data to a single destination computer.

On Windows, most of the configuration of replication and Recovery Point options can be accomplished from the Fan-In tab of the Agent Properties on the destination computer, and these settings are automatically applied to all the source computer. On UNIX, replication and Recovery Point options must be configured on each source computer.

Scalability

Although the scalability of a Fan-In setup can vary based on network and system resources, it is recommended that each Fan-In setup contains no more than 100 source clients.

For maximum performance and robustness, the total number of Replication Pairs configured for the same source volume should be kept to a minimum. If multiple Replication Pairs must be configured for the same source volume, the recommended upper limit is five.

For more information, see Using ContinuousDataReplicator in a Fan-In Configuration.


Throttling

You can configure several throttling options at the Agent level, in the Operational Parameters tab of the agent properties screen.

Network Bandwidth Throttling

The following can be configured on the Source computer:

note.gif (292 bytes)
  • When configuring throttling, you should consider what unintended affects throttling might have on operations. As one example, if you have a source computer that has significant file write activity, and you impose network bandwidth throttling which makes it impossible to transfer the logs quickly enough to the destination computer to keep pace with the rate of change on the source computer, log file space requirements would increase dramatically on the source computer. In such a case, provision must be made for sufficient log file space, based on the expected activity and throttling.
  • An example of a beneficial use of throttling involves configurations where multiple source computers are all configured to use the same destination computer. In this case, you may want to impose throttling on the source computers to allow the destination computer enough time to keep pace with all the log files it is receiving, and ensure sufficient log space on the destination computer as well to accommodate all of the logs it will be receiving.
  • You can configure Alerts to be generated when throttling is imposed, or when 80 percent or more of a volume's disk space is consumed, for all of the client computer's volumes. For more information, see Alerts and Monitoring.
  • On Windows in a clustered environment, when a cluster node is the active node for more than one virtual server at the same time, throttling rules are applied equally to all of the virtual servers hosted by that physical node, using the highest numbers specified for any one of them. For example, consider an active node hosting three virtual servers simultaneously, with throttling configured as follows on each of the virtual servers, VS1, VS2, and VS3:
    Throttling Parameter VS1 VS2 VS3
    Throttling based on percentage of free log space on destination: 30% 35% 40%
    Stop replication based on percentage of free log space on destination: 80% 70% 60%
    Abort source based on percentage of free log space on source: 75% 80% 70%
    Network Bandwidth Throttling amount: 10Mbps 40Mbps 90Mbps

    Since throttling for all Virtual Servers will be based on the highest number specified for any one of them, all three Virtual Servers would be subject to the throttling numbers shown in bold, not necessarily the numbers specified individually. If throttling is imposed based on the destination computer running low on log space, in this example, when free log space reaches 40% on any virtual server, the maximum transfer rate will be reduced by 50% on each of the virtual servers -- to 5Mbps on VS1, 20Mbps on VS2, and 45Mbps on VS3.

 

For step-by-step instructions, see Configure Network Bandwidth Throttling.


Orphan Files

Files that are in the destination directory, but not the source directory, are orphan files. You can choose to ignore, log, or delete such files that are identified in the destination path; these settings are configured in the Orphan Files tab of the Replication Set Properties.

By default, the Orphan File Processing is turned off and the orphan files are moved from the destination directory to another location and are available for restore. You can select the Show Deleted Items option in the browse screen to view and restore orphan files.

To configure Orphan File settings, see Configure Orphan File Processing for step-by-step instructions.

To view Orphan Files, see View Orphan Files for step-by-step instructions.

Things to Consider

See Restore Deleted Items to restore Orphan Files.

Fan-In Recovery Points

Fan-In Recovery Points consist of snapshots of a Destination Path, created to preserve a point-in-time data on the destination computer in a Fan-In configuration. Snapshot-based Recovery Points can be created, and backed up, affording additional data protection options for recovery of your data. In addition, Recovery Points can be mounted, and for Windows can also be shared, and thus made available to users on the network.

Recovery Points consist of snapshots created on the destination computer by the specified snapshot engine, without any reference to the state of the source computer. It simply represents a point-in-time on the destination computer, and is thus more useful for file system data than for application data. To use Recovery Points, see the following for step-by-step procedures:

Backups of Recovery Points

Recovery Points can be configured to be backed up automatically when they are created. In addition, you can select any existing Recovery Point and perform an immediate full backup on-demand. This backup capability is only available if the source and destination computers have the appropriate File System iDataAgent installed. For more information about installing, configuring, and using File System iDataAgents, see Windows File System.

The following types of backups are supported:

See the following for step-by-step procedures:

Deleting Recovery Points

When the maximum number of Recovery Points is reached, based on the maximum number you specified, or based on the maximum number of recovery points allowed by the system, they are automatically deleted by the system in the order they were created (oldest first) unless one of the Recovery Points to be deleted is in use.

Recovery Points can also be deleted manually. For step-by-step procedures, see Delete a Fan-In Recovery Point Using CDR.

Pre/Post Commands for Recovery Points

You can specify commands to run either before a Recovery Point is created and/or after a Recovery Point is created. For general information about Pre/Post commands, see Pre/Post Processes.

See the following for step-by-step procedures for Pre/Post Processes:

Considerations


Best Practices

It is recommended that you keep the following in mind when performing data replication:


Back to Top