Solved

Ldom Migration

Posted on 2014-02-09
8
575 Views
Last Modified: 2014-03-06
I got a question about, ldom migration.

Current setup on T4 servers.  Moving one T4 to another DC T4.
Ldom disks on SAN.
Ldom have 3 zones.
Prob: SAN disks cont moved to another T4 Since  other T4 server different location of DC.

Disk data around 500 GB.

Whats the best method to move this ldoms????
Need to taken care of boot env also.
0
Comment
Question by:surajindi4
  • 4
  • 4
8 Comments
 
LVL 22

Expert Comment

by:blu
ID: 39846284
Are you trying to do a live migration, or can you shut the ldoms down?
0
 

Author Comment

by:surajindi4
ID: 39846337
i can shutdown ldoms..
0
 
LVL 22

Expert Comment

by:blu
ID: 39847038
So, can you please elaborate on the constraints and the problem. Is the primary problem the need to replicate the SAN disks at the new site? I am not sure what your problem statement is saying.
0
 

Author Comment

by:surajindi4
ID: 39848211
primary problem already indicated how the data get moved?? with Boot env.
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 22

Accepted Solution

by:
blu earned 500 total points
ID: 39848277
Are the data centers networked together?
0
 

Author Comment

by:surajindi4
ID: 39848281
"Are the data centers networked together? " Nope..
0
 
LVL 22

Expert Comment

by:blu
ID: 39848607
Well the data has to be able to get from one to the other some how. If not over a network, then they need to move physically. If you don't need the disk to remain in the old data center, then move the disks. If you do need to leave them there, you will have to copy them first and then move the copies.
0
 

Author Closing Comment

by:surajindi4
ID: 39910452
No Solution given
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

I have been running these systems for a few years now and I am just very happy with them.   I just wanted to share the manual that I have created for upgrades and other things.  Oooh yes! FreeBSD makes me happy (as a server), no maintenance and I al…
Why Shell Scripting? Shell scripting is a powerful method of accessing UNIX systems and it is very flexible. Shell scripts are required when we want to execute a sequence of commands in Unix flavored operating systems. “Shell” is the command line i…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now