IBM VM Recovery Manager DR for Power Systems Version 1.5: Deployment Guide Overview for IBM VM Recovery Manager DR for Power Systems

IBM VM Recovery Manager DR for Power Systems Version 1.5: Deployment Guide Overview for IBM VM Recovery Manager DR for Power Systems

IBM VM Recovery Manager DR for Power Systems Version 1.5 Deployment Guide IBM Note Before using this information and the product it supports, read the information in “Notices” on page 195. This edition applies to IBM® VM Recovery Manager DR for Power Systems Version 1.5 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2020, 2021. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in VM Recovery Manager DR............................................................................................vii ISO 9000....................................................................................................................................................viii Overview...............................................................................................................1 Concepts...............................................................................................................5 KSYS............................................................................................................................................................. 5 HMC.............................................................................................................................................................. 7 Sites..............................................................................................................................................................7 Hosts.............................................................................................................................................................8 Workgroup....................................................................................................................................................9 Virtual machines........................................................................................................................................ 11 VIOS........................................................................................................................................................... 11 Storage agents........................................................................................................................................... 12 EMC storage subsystem....................................................................................................................... 13 SAN Volume Controller system and Storwize system......................................................................... 15 DS8000 storage system....................................................................................................................... 17 Hitachi storage systems....................................................................................................................... 18 XIV Storage System..............................................................................................................................26 Network......................................................................................................................................................27 Planning..............................................................................................................29 Requirements.............................................................................................................................................29 Limitations..................................................................................................................................................33 Prerequisites.............................................................................................................................................. 37 Prerequisite for virtual machines that run on the Linux operating system.........................................40 Disaster recovery mechanism.............................................................................. 43 Installing.............................................................................................................47 KSYS package.............................................................................................................................................48 Installing.................................................................................................................................................... 50 Upgrading...................................................................................................................................................53 Configuring..........................................................................................................57 Flow chart for KSYS configuration.............................................................................................................58 Setting up the KSYS subsystem.................................................................................................................58 Initiating the KSYS node...................................................................................................................... 58 Creating sites........................................................................................................................................59 Adding HMCs to the KSYS.................................................................................................................... 60 Adding hosts to the KSYS.....................................................................................................................61 Creating host pairs............................................................................................................................... 63 Creating host groups............................................................................................................................ 63 Adding storage agents to the KSYS......................................................................................................67 Setting up contacts for event notification............................................................................................72 Configuring VIOS.................................................................................................................................. 72 Customizing consistency group name................................................................................................. 73 iii Configuring the site-specific IP address..............................................................................................76 Configuring Single-Root I/O Virtualization (SR-IOV) override feature................................................77 Discovering resources................................................................................................................................77 Verifying the configuration.........................................................................................................................80 Daily checks by KSYS........................................................................................................................... 80 High availability features........................................................................................................................... 82 Setting up KSYS high availability through PowerHA SystemMirror.......................................................... 84 Recovering VMs................................................................................................... 87 Failover rehearsal of the disaster recovery operation.............................................................................. 87 Performing the DR failover rehearsal operation..................................................................................91 Flow chart for disaster recovery................................................................................................................95 Initiating the disaster recovery..................................................................................................................96 Recovering the failed virtual machines..................................................................................................... 98 Moving the virtual machines by using the force option............................................................................ 98 Moving the virtual machines by using other options................................................................................ 99 Relocation plan for virtual machines.........................................................................................................99 Unmanaged disks.................................................................................................................................... 100 Administering....................................................................................................103 Generating the KSYS system report........................................................................................................103 Configuring the flexible capacity policies............................................................................................... 104 Configuring the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    210 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us