Solved

How To Clone Server from RAID1

Posted on 2007-03-23
2
824 Views
Last Modified: 2012-06-27
I'd like to clone new servers (with only one RAID1) by simply pulling out one drive from the existing/working server and sliding it into a new server.
This should work all right, in principle.

QUESTION:  How to take care of the UNIQUE SYTEM ID etc. ?

Do I need to run any utility to generate a new/unique system ID ?
0
Comment
Question by:luckymilos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 22

Accepted Solution

by:
65td earned 125 total points
ID: 18780971
Yes this will work if using hardware RAID 1 for sure.  

Depending on the hardware may have to play around in bios (Dell), F8(?) for HP.

Download "newSID" to generate unique id for each "new" system..
0
 

Author Comment

by:luckymilos
ID: 18784773
Excellent. Thanks !
0

Featured Post

Optimize your web performance

What's in the eBook?
- Full list of reasons for poor performance
- Ultimate measures to speed things up
- Primary web monitoring types
- KPIs you should be monitoring in order to increase your ROI

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
Microsoft Office 365 is a subscriptions based service which includes services like Exchange Online and Skype for business Online. These services integrate with Microsoft's online version of Active Directory called Azure Active Directory.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question