Solved

File Server Data Migration

Posted on 2010-08-29
6
386 Views
Last Modified: 2012-05-10
Hi,

I have to replace an old HP ML360 with a not-so-old G4 DL360, which shouldn't be a problem as it's only running as a file server.  However, the filenames are too long for me to copy the data over to the new server without causing issues.

Can I simply add a hard drive from the ML360 to the DL360 so it mirrors across to the other (new) drives?

If not, what is the best way to migrate this data over?

Thanks
0
Comment
Question by:E-pro
  • 4
  • 2
6 Comments
 

Author Comment

by:E-pro
ID: 33555968
- I have used xcopy, but it's been a hassle in the past.
0
 
LVL 7

Expert Comment

by:simonseztech
ID: 33556106
Give robocopy a try http://en.wikipedia.org/wiki/Robocopy.

Else you can always image your drive using something like acorns true image and restore to your data folder or use the universal restore option.

A less expensive sofatware is macrium reflect.
0
 

Author Comment

by:E-pro
ID: 33583088
Robocopy doesn't handle long filenames well.

An image would be okay - can you take an image of a RAID 5 array?
0
Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

 
LVL 7

Accepted Solution

by:
simonseztech earned 500 total points
ID: 33583145
Yes you can image raid 5 image
0
 

Author Comment

by:E-pro
ID: 33766604
Thanks Simonseztech.  I've since managed to successfully migrate the data without any issues.
0
 

Author Closing Comment

by:E-pro
ID: 33766609
I wasn't able to test this, but I have received confirmation from other sources that RAID 5 imaging is possible.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Hi, I've made you some graphics for a better understanding how RAID works. First of all, there are two ways a raid can be generated: - By hardware - By software What does that mean? This means: If you have a hardware RAID controller, there…
This article is an update and follow-up of my previous article:   Storage 101: common concepts in the IT enterprise storage This time, I expand on more frequently used storage concepts.
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now