Hardware manual

Group Administration Table of Contents
x
Deleting inbound replica collection sets, replica collections, or replicas ........................................................... 12-33
13 Data recovery .................................................................................................................................. 13-1
About data recovery .............................................................................................................................................. 13-1
Data recovery procedures...................................................................................................................................... 13-2
Failing over and failing back a volume................................................................................................................. 13-2
Example of failing over and failing back a volume........................................................................................ 13-3
Promoting an inbound replica set to a recovery volume ................................................................................ 13-7
Where to go next ................................................................................................................................ 13-8
Recovery volume restrictions................................................................................................................... 13-9
Replicating a recovery volume to the primary group..................................................................................... 13-9
Where to go next .............................................................................................................................. 13-10
Moving a failback replica set to a different storage pool ............................................................................. 13-11
Failing back to the primary group ................................................................................................................ 13-11
Making a temporary volume available on the secondary group ......................................................................... 13-12
Permanently switching partner roles................................................................................................................... 13-12
Making an inbound replica set promotion permanent.................................................................................. 13-13
Where to go next .................................................................................................................................... 13-14
Converting a failback replica set to an inbound replica set.......................................................................... 13-14
Permanently promoting a replica set to a volume............................................................................................... 13-14
Handling a failed operation................................................................................................................................. 13-15
Manually performing the replicate to partner operation ..................................................................................... 13-16
Manually performing the failback to primary operation..................................................................................... 13-16
Part III: Troubleshooting
14 Group event logging........................................................................................................................ 14-1
About event messages ........................................................................................................................................... 14-1
Event priorities ...................................................................................................................................................... 14-2
About hardware alarms ......................................................................................................................................... 14-2
Event notification methods.................................................................................................................................... 14-2
Configuring E-Mail notification............................................................................................................................ 14-3
Changing the E-Mail notification configuration ............................................................................................ 14-3
Configuring E-Mail home ..................................................................................................................................... 14-4
Changing the E-Mail home configuration...................................................................................................... 14-4
Configuring syslog notification............................................................................................................................. 14-5
Changing the syslog notification configuration.............................................................................................. 14-5
Enabling or disabling the display of INFO event messages.................................................................................. 14-5
About SNMP traps ................................................................................................................................................ 14-6
Configuring SNMP trap destinations ............................................................................................................. 14-7
Changing the SNMP trap configuration ......................................................................................................... 14-7
Accessing PS Series array MIBs........................................................................................................................... 14-7
15 Group monitoring ........................................................................................................................... 15-1
About monitoring best practices ........................................................................................................................... 15-1
Getting started with group monitoring.................................................................................................................. 15-2
Monitoring events ................................................................................................................................................. 15-2
Accessing the event log file on a remote computer........................................................................................ 15-3
Accessing events sent to an E-Mail address................................................................................................... 15-3
Monitoring administrative sessions....................................................................................................................... 15-3