Users Guide

Дополнительные ресурсы.................................................................................................................................................. 4
Chapter 1: Введение.................................................................................................................... 5
Data protection.................................................................................................................................................................... 5
Snapshots..............................................................................................................................................................................5
Replication.............................................................................................................................................................................6
Protection policies...............................................................................................................................................................6
Chapter 2: Моментальные снимки.............................................................................................. 7
Create a snapshot................................................................................................................................................................7
Create a thin clone.............................................................................................................................................................. 7
Using clones to access read-only snapshots from hosts...........................................................................................8
Refresh a storage resource...............................................................................................................................................8
Restore a storage resource from a snapshot............................................................................................................... 9
Chapter 3: Protection Policies..................................................................................................... 10
Create snapshot rules....................................................................................................................................................... 10
Create replication rules.....................................................................................................................................................10
Recovery point objective............................................................................................................................................ 11
Alert threshold............................................................................................................................................................... 11
Create a protection policy................................................................................................................................................ 11
Modify a protection policy............................................................................................................................................... 12
Assign a protection policy to a storage resource....................................................................................................... 12
Unassign a protection policy........................................................................................................................................... 13
Chapter 4: Репликация............................................................................................................... 14
Remote systems.................................................................................................................................................................14
Synchronization.................................................................................................................................................................. 14
Failover................................................................................................................................................................................. 15
Performing a failover test.......................................................................................................................................... 15
Planned Failover........................................................................................................................................................... 16
Unplanned Failover.......................................................................................................................................................17
Appendix A: Сценарии использования...................................................................................... 18
Сценарии использования моментальных снимков и «тонких» клонов...................................................18
Сценарии использования репликации.................................................................................................................. 19
Using replication for planned downtime................................................................................................................. 19
Using replication for disaster recovery................................................................................................................... 19
Contents
Contents 3