4/1/2023 0 Comments Doubletake replication![]() Also, the replication can be queued locally on the source and scheduled to be sent to the target at a convenient time. Double-Take only replicates the changes to a file, which saves significant bandwidth. However, anytime Double-Take’s deployed away from your local network, bandwidth becomes a consideration. This might be necessary to start any applications and services that might need to be running if a failover is experienced.ĭouble-Take can be used across VPN connections. When using different servers, you can configure customized scripts to run on the target machine before and after failover. It’s also possible to configure a single machine as both source and target. You can also establish a chained configuration in which some servers act as both source and target. Backups for multiple servers can be performed from one target machine while saving the resources on the source machines. You can have many servers sending replication data to a single Double-Take target. Restoration procedures were implemented however, this did require taking the servers off the network for 20 minutes.ĭouble-Take supports many configurations and is convenient for centralized backup. We continued to work from the target machine, which assumed the identity of the original source, for more than an hour. After disconnecting the power to the source server, there was approximately a 40-second period before the failover was recognized by all clients. After deployment at the customer site, several clients were logged in to the source server. During our lab and onsite testing, Double-Take performed above expectations. In our customer’s situation, we were using a dedicated T1 bridged to a remote location, allowing the target to be located approximately eight miles from the source and still on the same subnet. While relatively simple, the process does require user intervention. Once the original source machine is repaired, the data can be restored back from the target. You can configure the target to poll the source machine and automatically failover to the target. For failover, you can configure the target machine to assume the IP address and host name of the failed source machine. This allows a real-time, up-to-the-minute backup of the server. Double-Take works at the byte level, and only replicates changes to the files. In a typical scenario where you’re protecting one source machine, you would first mirror the source to the target and then set up real-time replication. Transmit data, and what sorts of services they’ll run. The Double-Take connection managerĬonsole can determine what servers communicate, how often they’ll Source and target machines maintain a connection which is monitored byįigure 1. However, when it comes to failover, the hardwareĪnd software should really be the same on both machines. ![]() Like many backup solutions, Double-Take uses a source-target configuration.ĭepending on specific needs, the source and target hardware and softwareĭon’t have to be identical. With Double-Take, which offers a suite of capabilities including mirroring, Of scenarios on the solutions we recommend before rollout. We typically replicate client situations in a lab, and run a battery One of my technicians had been researching NSI Software’s Double-Take and suggested we put it to the test. Smarting from this experience, they wanted a remote backup solution that offered secure off-site backup, disaster recovery, failover and 99 percent uptime. My company was contacted by a medical outfit whose data and paper records were destroyed by a tornado. NSI tool offers mirroring, replication and failover. Product Reviews Failover That’s Worth a Double-Take ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |