Veritas Volume Replicator Web GUI Administrator's Guide 5.0 RU3 - Linux for IBM Power

  • Modified Date:
  • Article ID:000002128


Table of Contents:
Technical Support
1. Getting started
Features of VRW
Web browser requirements
Veritas Volume Replicator on the Web
Related Veritas documents
Role-based administration
Features available with the operator role
2. Setting up replication
About setting up replication
Overview of setting up replication
Example scenario
Creating a Replicated Data Set
Creating a Primary RVG of the RDS
Adding a Secondary to the RDS
Adding a bunker Secondary to the RDS
Add Bunker: Prerequisites panel
Add Bunker: Bunker Host, DiskGroup and Protocol panel
Add Bunker: Confirmation panel
Synchronizing the Secondary and starting replication
Setting up replication using automatic synchronization
Setting up replication using full synchronization
Setting up replication using block-level backup and checkpoint
Setting up replication using difference-based synchronization
Setting up replication when data volumes are initialized with zeroes
3. Viewing configuration and status information
About viewing configuration and status information
Viewing summary information
Managing Summary view
Replicated Data Sets view
Viewing detailed information about the RDS
RDS detail view - Summary tab
RDS detail view - Primary tab
RDS detail view - Secondaries tab
RDS detail view - Bunker tab
RDS detail view - Clusters tab
RDS detail view - Alerts tab
Information displayed in RDS views
Conventions for the RDS icons
Conventions for the RVG icons
Primary RVG states
Secondary RVG data status
Replication Status
4. Administering Veritas Volume Replicator
About administering Veritas Volume Replicator
Administering data volumes
Associating volumes to a Replicated Data Set
Resizing a data volume in a Replicated Data Set
Dissociating a data volume from its Replicated Data Set
Administering replication
Changing the replication settings
Starting replication to a Secondary
Pausing replication to a Secondary
Resuming replication to a Secondary
Stopping replication to a Secondary
Changing the IP addresses used for replication
Administering the Replicated Data Set
Removing a Secondary from a Replicated Data Set
Removing a Bunker from a Replicated Data Set
Removing a Primary RVG
Administering checkpoints
Creating checkpoints
Ending checkpoints
Viewing checkpoints
Deleting checkpoints
Administering the SRL
Protecting from SRL overflow
Incrementally synchronizing the Secondary after SRL overflow
Resizing the SRL
5. Transferring the Primary role
About transferring the Primary role
Migrating the Primary role
Migrate Role: Prerequisites panel
Migrate Role: Summary panel
Taking over from an original Primary
Takeover dialog window
Failing back to the original Primary
Failing back using fast-failback synchronization
Failing back using difference-based synchronization
Using a bunker for disaster recovery
Updating the Secondary from the bunker
Activating a bunker in an RDS
Deactivating a bunker
A. Troubleshooting VRW
About troubleshooting VRW
Application page is not displayed in the browser
Missing buttons on certain wizards
Log in redirects the user back to the login page

Terms of use for this information are found in Legal Notices.



Did this article answer your question or resolve your issue?


Did this article save you the trouble of contacting technical support?


How can we make this article more helpful?

Email Address (Optional)