Feature Guide: Double-Take For Windows v5.0
Feature Guide: Double-Take For Windows v5.0
www.doubletake.com
888-674-9495
FEATURE GUIDE: Double-Take® for Windows v5.0
FEATURE GUIDE
Double-Take® for Windows v5.0
TABLE OF CONTENTS
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Product Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Intelligent Compression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Email Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4
Management Console Server Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
(New) Full-Server Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
(New) Server Recovery Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
(New) Virtual Recovery Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
(New) Enterprise Install Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Product Update Checking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Asynchronous, Byte-level, Continuous Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .5
Hardware Independence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Simple Management Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Double-Take Reporting Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Uses Existing Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Task Command Processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Unlimited Distance Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6
Many-to-One Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Automated Failover . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Open-file Mirroring and Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Flow Control (Unlimited Disk Queuing) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Bandwidth Throttling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
Resource Planning Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Active/Active MSCS Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Serverless Backup Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Block Checksum Re-Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
Replication Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
FEATURE GUIDE: Double-Take® for Windows v5.0
Automatic Re-Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
File/Directory Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Support for Different File Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Verification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
SNMP Counters and Traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
(New) Enhanced Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Full Command-Line Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
(New) Advanced Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Server Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Target Reboot Without Re-Mirror . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
ICMP-less ping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
MOM Integration Pack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .9
Volume Shadow Copy Service Snapshot Integration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Reports and Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
64-bit Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Enhanced Integration with Double-Take Application Manager . . . . . . . . . . . . . . . . . . . . . . . . . . .10
(New) Interoperability with HSM Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Target State Awareness . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Target Path Blocking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10
Introduction
Product Description
Double-Take® from Double-Take Software goes beyond periodic backup to provide accessible and affordable data protection, ensure minimal
data loss, and enable immediate recovery from any disaster or system outage. Double-Take uses patented replication and failover technology
that continuously captures byte-level changes as they happen and replicates those changes to one or more target servers at any location,
locally or at a recovery site miles away. In the event of a disaster, Double-Take lets you recover from your target servers in minutes, if not
seconds. What's more, Double-Take delivers better protection than many hardware-based solutions, and it costs tens of thousands less. Start
with as few servers as you like, scale organically as your data requirements grow, and get a fast and continuing return on your investment.
Features
Intelligent Compression
Double-Take® is the only host-based replication solution that provides multilevel intelligent compression. Double-Take provides four options
for data compression that allows custom configuration to suit each customer’s individual requirements. These settings can be individually
configured for each replication set defined within Double-Take, allowing even further
customization by server, data, and/or network.
The first level is ‘no compression’. Chose this setting for data that resides on application
servers that require full availability of system resources or where network bandwidth is not
a concern. Less critical data where latency is not a major concern may also be considered
for no compression.
The next three levels enable compression, but to differing degrees. There is a tradeoff to
consider when choosing compression levels. Higher compression levels require Double-Take
to use additional system resources, including CPU and RAM, on both the source and target
servers. Level one provides the least amount of compression, using the least amount of
As certain data types can actually increase in size when compressed, which will result in more data being transmitted rather than less,
Double-Take compares the size of the compressed data to that of the uncompressed and will transmit the smaller of the two. This ensures
that Double-Take compression does not increase the load on the network when intending to decrease it. Customers don’t have to be
concerned with first validating the data for its ‘compressibility’ prior to enabling compression. Double-Take will intelligently compress only the
data from which a benefit will result.
Email Alerts
For optimal data protection and availability, Double-Take can provide event notifications via email for immediate awareness of possible breaks
in service levels. Email alerts can be configured with different recipients for each Double-Take server, with each having its own event
notification level (informational, warning, error). The email message will include useful information in the subject line, including server name
where the event occurred and the error level and code. By using Double-Take, administrators can quickly and easily manage events via their
email clients by sorting or filtering by these events. They can then choose which ones require immediate attention and which do not.
By providing immediate and at-a-glance updates of the Double-Take environment via email, administrators do not have to continually monitor
the Double-Take management console to ensure everything is operating smoothly. This ability greatly increases the scalability and
manageability of the Double-Take environment.
4
FEATURE GUIDE: Double-Take® for Windows v5.0
5
FEATURE GUIDE: Double-Take® for Windows v5.0
Hardware Independence
Whereas hardware-based synchronous replication is often proprietary for each storage vendor and provides no cross-vendor replication,
Double-Take has no affinity to any hardware or storage provider or storage architecture (SCSI, FibreChannel, iSCSI). This independence allows
Double-Take to be used on existing heterogeneous storage infrastructures and does not lock you in to a specific vendor for future purchases.
Using a hardware-independent solution allows for a myriad of uses not possible with proprietary array-based solutions. Performing migrations
to new hardware, implementation of a SAN or NAS, or any other project that requires moving data from one storage device to another is
possible and efficient with Double-Take, and there are no distance limitations. Best of all, there is no installation or training required every
time new hardware is added. Simply connect the storage to a host already running Double-Take, and define the data to be replicated.
Double-Take Reporting Center allows you to show the overall effectiveness of your Double-Take protection scheme over time, giving you the
information that you need to be accountable to management. Double-Take Reporting Center also allows you verify the integrity of the data
on your target server and gives you the ability to identify subtle or growing problems that may only be visible when looking at trends over
time.
6
FEATURE GUIDE: Double-Take® for Windows v5.0
Many-to-One Failover
Double-Take can be configured such that a single target server is used for numerous source servers. This can reduce the total cost of
ownership as it is not necessary to have a one-to-one exact duplicate of the hardware for replication purposes, as is the case with many other
replication solutions. This also helps to facilitate centralized backup since many local or remote servers can be backed up from a single server,
further lowering costs by reducing the number of backup licenses needed.
Automated Failover
Whether running MSCS or not, Double-Take can provide high-availability failover of servers
to ensure users remain online in case of a failure. While MSCS has distance limitations,
Double-Take does not, thereby providing failover protection during local AND regional
failures. This availability allows users and customers to quickly have access to their systems
and data. For customer-facing systems, it ensures that customer satisfaction remains high
and sales are not impacted. (Figure 2)
Bandwidth Throttling
User-defined controls within Double-Take can limit the amount of the available network
bandwidth it can use for data replication. This allows replication to occur real-time without
impacting users on the same network. And, since Double-Take has the ability to queue data
for transmission, all changes will be updated to the target and not lost due to network
limits. Double-Take allows the administrator to define the actual type of network connection
being used (T1, 128Kbps, etc.) and then define the amount that can be used for replication.
Double-Take will not go beyond that limit, regardless of the amount of data it has to
transfer. Double-Take also allows you to limit network use during busy work hours and
increase or remove limits during non-peak hours. (Figure 3)
Figure 3: Bandwidth Throttling
7
FEATURE GUIDE: Double-Take® for Windows v5.0
Failback/Restore
Should a failure occur, Double-Take can facilitate data restoration from the target back to the original source or to an alternate location.
Through the Double-Take UI, users can easily restore data from the replicated disk back to the production disk once the failure is corrected.
This greatly reduces the time to recover and restore, as it is not necessary to go offsite for tapes and then restore one at a time. This also
ensures that you recover from the time the failure occurred, not from when the last backup was taken, which can result in a day or more of
lost data and productivity. Unlike other solutions that make the users remember which files came from what location, the Double-Take restore
process automatically reverses the direction of your original replication job.
Replication Scheduling
Double-Take provides the flexibility to schedule when replication occurs. Double-Take will continue to filter and queue up all appropriate data
changes until the scheduled time has arrived, then replicates the queued changes to the target until the user-defined replication window
closes. This allows users to fine-tune Double-Take around their business needs to ensure network
and system resources are used efficiently and that replication does not impact production.
Versioning Mirrors
If multiple point-in-time versions are required, Double-Take can easily integrate with 3rd-party point-in-time applications for the creation of
multiple copies of the source data from different times throughout the day.
Automatic Re-Mirror
Should a problem or even scheduled maintenance require that the connection between the source and target be broken, Double-Take will re-
establish its connection when possible and will automatically re-mirror the source to the target(s), ensuring the target remains in sync with
the source.
8
FEATURE GUIDE: Double-Take® for Windows v5.0
File/Directory Selection
With Double-Take you can select full file systems, directories or files for replication. This gives greater flexibility to configure efficient use of
resources. Important files can be selected, while system and temporary files can be skipped. The use of wildcards and drag-n-drop facilitate
quick and simple configuration.
Support for Different File Types
Double-Take has been successfully tested against different file types such as encrypted and compressed, and ultra-long file names, among
others. This ensures that Double-Take will be sure to correctly replicate all the data in your environment.
Verification
Although Double-Take has numerous checks to validate that the data on the target is an exact replica with the source, there is also a
verification option that can be run (either scheduled or immediately) that will verify the target is in sync with the source and create a report.
This is useful when there is a brief outage, if services are stopped, or if someone has made direct updates to the data on the target. You can
choose to just report on any differences or have all differences corrected.
Server Groups
Server groups and health status information within the Double-Take console allow you to easily manage multiple Double-Take servers and
centrally monitor the health of real-time replication and failover.
ICMP-less ping
Additional options for failover monitoring provide the ability to monitor the Double-Take service in place of monitoring the IP address of the
production server.
9
FEATURE GUIDE: Double-Take® for Windows v5.0
Double-Take’s VSS Snapshot Integration feature leverages Target State Awareness to take automatic point-in-time snapshots of protected data
as data moves from a “known” to an “unknown” state. This ensures that the administrator has at least a “known-good” copy of the
protected data from which to recover.
Warning: No part of this document may be reproduced or transmitted in any form or by any means, electronic, or mechanical, for any reason, without the express written
permission of Double-Take Software, Inc. The information in this document is subject to change without notice. Although we try to provide quality information, Double-Take
Software makes no claims, promises or guarantees about the accuracy, completeness, or adequacy of the information contained in this document. Companies, names and data
used in examples herein are hypothetical and/or fictitious unless otherwise stated.
© Double-Take Software. All rights reserved. Double-Take, GeoCluster, Double-Take for Virtual Systems, and NSI are registered trademarks of Double-Take Software, Inc. Balance and Double-Take ShadowCaster
are trademarks of Double-Take Software, Inc. Microsoft, Windows, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. All other
trademarks are the property of their respective companies.