
Installing the Failover Manager for Hyper-V Server...........................................................122
Uninstalling the Failover Manager from Hyper-V Server....................................................122
Using the Failover Manager for VMware vSphere................................................................123
Installing the Failover Manager for VMware vSphere.......................................................123
Installing the Failover Manager for other VMware platforms..............................................124
Configuring the IP address and host name.................................................................124
Installing the Failover Manager using the OVF files with the VI Client.................................125
Configure the IP address and host name....................................................................125
Finishing up with VI Client.......................................................................................125
Troubleshooting the Failover Manager on VMware vSphere..............................................125
Uninstalling the Failover Manager from VMware vSphere.................................................126
Using a virtual manager........................................................................................................126
Requirements for using a virtual manager............................................................................127
Adding a virtual manager.................................................................................................128
Starting a virtual manager to regain quorum.......................................................................129
Verifying virtual manager status.........................................................................................130
Stopping a virtual manager...............................................................................................130
Removing a virtual manager from a management group.......................................................131
10 Working with clusters............................................................................132
Clusters and storage systems..................................................................................................132
Creating a cluster.................................................................................................................132
Cluster Map View............................................................................................................133
Monitoring cluster usage.......................................................................................................133
Editing a cluster....................................................................................................................133
Editing cluster properties...................................................................................................133
Editing iSNS servers.........................................................................................................133
Editing cluster VIP addresses..............................................................................................134
Reconnecting volumes and applications after changing VIPs or iSNS servers............................134
Maintaining storage systems in clusters....................................................................................135
Adding a storage system to a cluster..................................................................................135
Upgrading the storage systems in a cluster using cluster swap................................................135
Reordering storage systems in a cluster...............................................................................136
Exchange a storage system in a cluster...............................................................................136
Removing a storage system from a cluster............................................................................136
Troubleshooting a cluster.......................................................................................................137
Auto Performance Protection..............................................................................................137
Auto Performance Protection and the VSA.......................................................................137
Auto Performance Protection and other clusters................................................................137
Repairing a storage system................................................................................................138
Deleting a cluster..................................................................................................................139
11 Provisioning storage..............................................................................141
Understanding how the capacity of the SAN is used.................................................................141
Provisioning storage..............................................................................................................141
Provisioning volumes.............................................................................................................141
Full provisioning...............................................................................................................142
Thin provisioning.............................................................................................................142
Best practice for setting volume size...............................................................................142
Planning data protection...................................................................................................142
Former terminology in release 8.1 and earlier.................................................................142
Data protection level....................................................................................................143
How data protection levels work...................................................................................144
Network RAID-10 (2–Way Mirror).............................................................................144
Network RAID-10+1 (3-Way Mirror)..........................................................................144
Network RAID-10+2 (4-Way Mirror)..........................................................................145
8
Contents