本文件已封存並已停止維護。

Setting up DPM Chaining

Chaining, as the name suggests, lets you create a chain of DPM servers protecting the next DPM server in the chain.

Cyclic protection is aimed at smaller architectures like in a branch office, where two DPM servers can protect each other.

To set up chaining

  1. Install the DPM protection agent on the DPM server that you want to protect from the DPM server you want to protect it from.

  2. Configure secondary protection for the data sources protected by the DPM server you are protecting.

note附註
In the DPM Administrative Console of one DPM server, you cannot view the data sources that the DPM protection agent already protects. This feature prevents you from protecting data sources repeatedly.

Assume an architecture where you have two DPM servers, DPM1 and DPM2. Each of these servers protects one or more data sources of their own. To set up chaining for these two servers, do the following:

  1. Install the DPM protection agent from DPM1 to DPM2 and vice versa.

  2. Configure secondary protection on DPM2 for servers that DPM1 protects.

  3. Configure secondary protection on DPM1 for servers that DPM2 protects.

What is protected on the DPM server

In DPM 2010, the secondary DPM server supports protection for the following items from the primary DPM server:

  • The databases in the instance of SQL Server on the primary DPM server.

  • All local volumes and application data on the primary DPM server.

  • All replicas on the primary DPM server that the primary DPM server directly protects.

顯示: