Solved

Secondary DPM Configuration

Posted on 2013-01-06
2
768 Views
Last Modified: 2013-06-12
Hello All,

I am currently trying to configure a secondary DPM (both are 2012) to protect our primary server.

I am not receiving any errors but am not sure what configuration decisions to make.

Currently our Primary DPM is configured to protect itself. With the addition of a Secondary DPM, should I stop that?

When I attempt to protect the PDPM's C: from SDPM, It discovers the mount points for all of the replicas protected by PDPM, and asks to add these, should I?

After passing those messages, I am advised that the source (C:) cannot be protected because it is protected on the primary server.

my PDPM currently protects its own C: and system state.

Should I unprotect C: on the primary so I can do it from the Secondary, and do I need to add those mount points?

I have been unable to find a good configuration guide online, other than paraphrasing of  "protect the bits you want", which is not technical enough!

Thanks.
0
Comment
Question by:FCAustralia
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 9

Assisted Solution

by:Sandeep Gupta
Sandeep Gupta earned 500 total points
ID: 38754865
0
 
LVL 9

Accepted Solution

by:
Sandeep Gupta earned 500 total points
ID: 38754874
0

Featured Post

What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Microsoft will be releasing the Windows 10 Creators Update in just a matter of weeks. Are you prepared? Follow these steps to ensure everything goes smoothly and you don't lose valuable data on your PC.
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…

635 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question