Solved

Moving server hard drives to new server

Posted on 2013-01-29
3
430 Views
Last Modified: 2016-10-27
I have an old HP ML 110 G5, running a 2-drive RAID1 SATA array from an Adaptec HostRaid controller.

I have a new HP ML 350 G6, running a 2-drive RAID1 SAS array from a P410i controller, plus an onboard SATA controller.

After taking 1 drive out of the ML110 array and putting it into the ML350's SATA controller,  the Windows Server 2008 boots fine. HPSIM is then run to install the new drivers.

The server is then rebooted into Acronis Backup & Recovery boot disk. Using Acronis Disk Management I can clone the drive from the SATA drive to the SAS array.

When booting from the ML350's SAS array, Windows boots as far as crcdisk.sys and then reboots, even in safe mode.

Is there a way to edit offline edit Windows to only look for the SAS controller, and not the SATA controller? I'm certain it's a hard coded entry in the registry still pointing to the SATA controller.

I'd rather not reload the server, that would be a final option.
0
Comment
Question by:acecom
  • 2
3 Comments
 

Accepted Solution

by:
pro-install earned 500 total points
ID: 38831354
I allways use Acronis Universal Restore to restore a image on different hardware.
My advice:

Make a image of the old server, put it on a usb disk or network drive.
Restore the image using Acronis Universal Restore you can add specific drivers for raid controllers.

I dont think its possible to use universal restore if you just clone a disk.
0
 
LVL 1

Author Comment

by:acecom
ID: 38831481
I'm not able to get purchase sign off of Universal Restore, and I agree it would be ideal.

I was hoping there was a manual way of achieving the same task.

Thanks
0
 
LVL 1

Author Comment

by:acecom
ID: 38851273
I plugged the SATA drives into an HP 8300 workstation. This booted perfectly and has been used as a migration server.

I'm now managed to get signoff on Universal restore, and will use that to port the OS properly.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
When we purchase storage, we typically are advertised storage of 500GB, 1TB, 2TB and so on. However, when you actually install it into your computer, your 500GB HDD will actually show up as 465GB. Why? It has to do with the way people and computers…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question