Solved

Imaging a RAID 1 Array

Posted on 2010-08-25
6
617 Views
Last Modified: 2016-12-08
I have a project involving deployment of multiple servers that are set up with RAID 1.  I have a reference server already set up with the RAID 1 volume, Server 08 installed and all applications and files loaded.  I'm doing sysprep and need now to clone this server to the other servers.  Anyone have some ideas on best practices or maybe just simply real practices in doing something like this?
0
Comment
Question by:sedberg1
6 Comments
 
LVL 2

Accepted Solution

by:
100243196 earned 125 total points
ID: 33523555
We use a ghost server and capturing the "Gold image" also captures the array configuration.
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 125 total points
ID: 33523748
You could do it in hardware by splitting the mirror and putting it in two machines and re-mirroring, not normally advisable though since then the controller might get confused in future if two of these split-and-remirrored arrays got in the same system as they'd have the same metadata on them. Depends on controller though.
0
 
LVL 63

Assisted Solution

by:SysExpert
SysExpert earned 125 total points
ID: 33524281
I prefer either Ghost, WDS or you may be able to use PING or FOG

Depends on   $$$, and time constraints.



http://ghost.radified.com/ghost_alternatives.htm
http://www.911cd.net/forums//index.php?showtopic=16534

http://www.osalt.com/ghost


I hope this helps !
0
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

 
LVL 16

Assisted Solution

by:gurutc
gurutc earned 125 total points
ID: 33524442
Hi,

I'd image the source server.  Then on the destination servers I'd unhook the second drive from the controller so only one member of the 'future' RAID 1 array is online and image to that.  Then I'd bring up the destination server, making sure it works, down it and connect the second drive, and then bring up the server again and manually add the second drive as a mirror to the first.  This doesn't capture the 'image the array config' spirit, but it does end up with what you want.

Good Luck,
- gurutc
0
 

Author Comment

by:sedberg1
ID: 33597304
What we did was create the reference server and power it down.  Took a Ghost image of it.  Then set up a new server.  Made RAID array as a mirror.  Deployed the Ghost image to the new server.  Since the new server had a RAID volume via hardware, it looked like one regular volume to the Ghost image, and everything worked out fine.
0
 
LVL 16

Expert Comment

by:gurutc
ID: 33598725
Glad you got it going!

- gurutc
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A Bare Metal Image backup allows for the restore of an entire system to a similar or dissimilar hardware. They are highly useful for migrations and disaster recovery. Bare Metal Image backups support Full and Incremental backups. Differential backup…
When we purchase storage, we typically are advertised storage of 500GB, 1TB, 2TB and so on. However, when you actually install it into your computer, your 500GB HDD will actually show up as 465GB. Why? It has to do with the way people and computers…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question