HP Application Recovery Manager software A.06.10 Installation and licensing guide (March 2008)
The installed directory structure ............................................................... 35
Configuring automatic startup and shutdown ............................................ 37
Setting environment variables ................................................................. 38
Allocating more disk space for the Cell Manager installation ..................... 38
What’s next? ....................................................................................... 39
Installing a Windows Cell Manager .............................................................. 39
Installation procedure ............................................................................ 41
After the installation .............................................................................. 47
Troubleshooting .................................................................................... 47
What’s next? ....................................................................................... 48
Installing Installation Servers ......................................................................... 48
Installing Installation Servers for UNIX ..................................................... 48
Installing an Installation Server for Windows ............................................ 52
Installing Application Recovery Manager clients .................................................... 57
Remote installation of Application Recovery Manager clients ............................ 58
Application Recovery Manager components ................................................... 64
Installing Windows clients ............................................................................ 66
Local installation of the Application Recovery Manager clients .................... 67
Installing HP-UX clients ................................................................................. 71
Local installation of HP-UX clients .................................................................. 72
Installing the Application Recovery Manager integration clients ............................... 75
Microsoft Volume Shadow Copy Service clients ............................................... 75
Oracle clients ............................................................................................. 75
SAP R/3 clients .......................................................................................... 76
HP StorageWorks Disk Array XP integration .................................................... 79
HP StorageWorks Enterprise Virtual Array integration ...................................... 79
Installing Application Recovery Manager on MC/ServiceGuard .............................. 80
Installing a cluster-aware Cell Manager ......................................................... 80
Installing a cluster-aware client ...................................................................... 81
Installing Application Recovery Manager on Microsoft Cluster Server ....................... 81
Installing a cluster-aware Cell Manager ......................................................... 81
Installing cluster-aware clients ....................................................................... 89
3 Maintaining the installation .............................................. 91
In this chapter ................................................................................................... 91
Importing clients to a cell ................................................................................... 91
Importing an installation server to a cell .............................................................. 93
Importing a cluster-aware client to a cell .............................................................. 94
Microsoft Cluster Server ............................................................................... 94
Exporting clients from a cell ................................................................................ 95
Security considerations ....................................................................................... 98
Security layers ............................................................................................ 98
4