No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


OceanStor BCManager 6.5.0 eReplication User Guide 02

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Features and Functions

Features and Functions

This section introduces the features and functions provided by eReplication.

Table 1-1 describes features and functions provided by eReplication.
Table 1-1  Features and functions




Unified management of DR resources

Automatic storage resource-aware

Automatically detects storage resources.

Automatic aware of hosts and applications

Automatically detects hosts and applications.

Automatic aware of FusionSphere VMs

Automatically detects FusionSphere VMs.

Automatic aware of VMware VMs

Automatically detects VMware VMs.

Rights- and domain-based management

Rights- and domain-based management

Grants different management resources and permissions to users at different levels. Users can only view and operate resources within their permission range during DR management.

Policy-driven automatic DR protection

Active-passive DR

  • Supports active-passive DR based on storage array synchronous replication (SAN), asynchronous replication (SAN), asynchronous replication (VIS), asynchronous replication (NAS), mirroring (VIS) + asynchronous replication (SAN), HyperVault, and SAN/NAS integrated asynchronous replication.
  • Supports FusionSphere active-passive DR based on host-based replication.

Geo-redundant DR

  • Supports geo-redundant DR based on cascading replication (synchronous and asynchronous), parallel replication (synchronous and asynchronous), cascading replication (asynchronous and asynchronous), and parallel replication (asynchronous and asynchronous).
  • Supports geo-redundant DR based on active-active (VIS) + asynchronous replication (SAN), HyperMetro (SAN) + asynchronous replication (SAN), HyperMetro (SAN) + synchronous replication (SAN), and HyperMetro (NAS) + asynchronous replication (NAS).

Active-active DR

Supports active-active DC DR based on active-active (VIS), HyperMetro (SAN), and HyperMetro (SAN) + snapshot (SAN), HyperMetro (NAS), HyperMetro (NAS) + HyperVault.

Local HA

Supports local HA DR based on mirroring (VIS).

Local protection

Supports local protection based on clone (SAN), snapshot (SAN), snapshot (NAS), and snapshot (VIS).

Application compatibility

Supports the following applications:
  • Single-node Oracle and Oracle RAC, PowerHA, ServiceGuard, RHCS, and Sun Cluster.
  • Single-node DB2 and DB2 VCS, PowerHA, ServiceGuard, and RHCS.
  • Single-node Microsoft SQL Server and Microsoft SQL Server WSFC.
  • Single-node Exchange.
  • InterSystems Caché.
  • File systems including Windows NTFS, Linux EXT3, EXT4, and XFS.

Virtualization compatibility

Supports the following VMs:
  • VMs in FusionSphere OpenStack private cloud scenarios.
  • VMs in and FusionSphere non-OpenStack scenarios.
  • VMware VMs.

User-defined protection policy

  • Uses the replication policy template to customize policies based on service requirements. Users can change the periods and settings specified in replication policies. The time interval of periodic protection can be minutes (15 minutes at least), hours, days, weeks, and months.
  • Customizes DR protection scripts to enable or disable DR protection to meet onsite service protection requirements.
  • Customizes policies to protect application consistency. Users can implement application consistency and inconsistency protection.
  • Configures replication rate plans.

RPO satisfaction check

Enables recovery point objective (RPO) satisfaction check and statistics collection.

One-click DR

Centralized management of recovery plans

Prepares recovery plans for applications or VMs based on service requirements. If a disaster occurs, services can be recovered by one click using the recovery plans. Recovery plans are centrally managed and monitored.

User-defined scripts

Adds a user-defined script during the recovery process to expand DR capabilities.

User-defined recovery procedures

Adds or deletes recovery steps for different types of application and makes execution policies for these steps. A recovery execution policy specifies whether a recovery step is implemented again after it fails.

Fine-grained recovery settings

Specifies recovery settings of protected applications or VMs, such as whether to start during the recovery, start sequence, and network configurations.

Fault recovery

Executes a specific recovery plan for failback, if a fault occurs at the production site. This entire process is automated.

Planned migration

Performs planned migration according to the recovery plan if services are interrupted due to anticipated risks (such as power outage and routine maintenance). This entire process is automated. The DR site automatically takes over services.

DR tests (on an isolated network)

  • Performs DR tests on an isolated network in virtual environments.
  • Performs DR tests for specific recovery plans to check the VM protection health, expose risks, and estimate the recovery time objective (RTO) of the recovery plans, in the case of no intervention on production services.

Test data clearing

Clear test data at the DR site can be cleared and resources can be restored to the status before DR tests, in the case of no intervention on production services.


  • Performs reprotection after planned migration. After the devices at the production site are recovered, the production site can perform backward protection for the services taken over by the DR site.
  • Determines whether to save user-defined configurations during reprotection.

End-to-end DR visualization

Visualized DR protection process

Monitors DR protection progress and collects time consumption statistics.

Visualized recovery process

Monitors progress and collects time consumption statistics for processes such as fault recovery, migration, DR test, test data clearing, and reprotection.

Global topology

  • Displays physical DR network topologies in a visualized manner, and monitors network elements (NEs) such as hosts and storage arrays as well as the link status between NEs.
  • Displays server (application) nodes at the DR site and their relationships with storage nodes.

Logical topology

Displays logical topologies of application protection in a visualized manner, showing the mappings and data flows among the protected applications, production storage, DR storage, and DR hosts.


Collects statistics on RPO satisfaction, RTO pre-evaluation, top alarms, protection status, and DR test status.

DR report

DR report

Generates reports on the running of DR services (protection execution results, actual RPO, and estimated RTO) and DR test reports (test execution time and results). DR reports can be exported as xlsl files.

DR alarm reporting

Alarm monitoring

Monitors DR alarms in a timely manner.

Alarm notification

Sends alarm notification short messages and emails to specified recipients.

Superb reliability

Configuration data backup and recovery

  • Manually or automatically backs up configuration data to SFTP servers in an online manner.
  • Imports the configuration data backup for recovery in an offline manner.

Capability of being integrated

Northbound interfaces

Provides RESTful and SNMP Trap northbound interfaces and supports DR recovery control and alarm reporting functions.

Interface integration

Can be integrated with eSight.

Security features

Security features

Supports the following:
  • Security management protocols such as SSH and SNMP v3.
  • Secure access through HTTPS.
  • Sensitive data protection.
  • Verification code login.
  • User-defined settings such as password complexity, session timeout duration, and maximum number of login attempts
  • Integrity check before installation.
  • User operation logs.
  • Protection against cross-site scripting and SQL injection attacks.
  • Hardening of databases and operating systems.
  • Defense against brute force REST cracking.
  • Web application security.
Updated: 2019-05-21

Document ID: EDOC1100075861

Views: 14204

Downloads: 70

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next