Contents
1 Volume Shadow Copy Service..........................................................................10
Overview.............................................................................................................................................10
Overview of the VSS Provider............................................................................................................10
2 Environmental Prerequisites..............................................................................12
System configuration..........................................................................................................................12
Examples of supported system configurations..............................................................................12
Example of VMware Guest to Guest Backup (FC) function system configuration........................13
Examples of Ext Stor configuration...............................................................................................17
Example of HA configuration.........................................................................................................18
Server prerequisites............................................................................................................................19
Software prerequisites........................................................................................................................21
Operating systems.........................................................................................................................21
Virtual environments......................................................................................................................21
Software........................................................................................................................................22
Services.........................................................................................................................................22
The software required to use the VMware Guest to Guest Backup (FC) function........................22
Support scope of Ext Stor configuration .......................................................................................22
RSG..........................................................................................................................................22
RSG assignment of each resource..........................................................................................23
Placement location of command device which is connected to host.......................................24
Support scope of HA configuration................................................................................................24
Adapter function.......................................................................................................................24
Placement location of command device which is connected to host.......................................25
Storage requirements.........................................................................................................................25
Restrictions and points of consideration.............................................................................................26
Restrictions and points of consideration related to the environmental configuration....................26
Server Account Authentication.................................................................................................26
Environmental configuration via remote desktop.....................................................................26
Items to confirm during installation...........................................................................................27
Installation drive.......................................................................................................................27
Path length of the installation folder.........................................................................................27
Number of LUs which can be mapped to the host group.........................................................27
How to create setup, maintenance configuration, and configuration files................................27
Hewlett Packard Enterprise shortcut of the Start Menu...........................................................27
Installation of other VSS Provider............................................................................................28
Account Authentication............................................................................................................28
RAID Manager (HORCM)........................................................................................................28
Host group creation..................................................................................................................28
Creating a user authentication account for storage administration..........................................28
Assigning LDEV ID...................................................................................................................29
Resource Group (Resource Partition)......................................................................................29
Raw Device Mapping (RDM)....................................................................................................29
Command device.....................................................................................................................29
SCSI controller type.................................................................................................................29
SCSI controller created by VSS Provider.................................................................................29
VMware HA..............................................................................................................................29
Operational restrictions and points of consideration.....................................................................30
Multiple instances of the VSS Provider....................................................................................30
Unregistering a disk array system............................................................................................30
Number of user accounts that can be registered for a disk array system................................30
Changing the configuration file or the maintenance configuration file.....................................30
Contents 3