This article will detail the appropriate points in configuration where the use of Checkpoints within the Veritas Volume Replicator (VVR) software is necessary.
VVR Checkpoints are user-defined markers on the Primary Replciator Log. There are 2 types of checkpoints
- RVG Checkpoint
- RLINK (Secondary) Checkpoint
The RVG checkpoint has a start (Checkstart) and an end (Checkend) and can be used for initial synchronisation.
The process requires the configuration of a CheckStart process. Once this is complete, a block level backup of the Primary Data is necessary, before performing a CheckEnd.
After this is complete, the data must be restored to the Secondary site before starting / resuming replication using the CheckPoint configured at the beginning of the process.
The RLINK (Secondary) CheckPoint is used to restore Secondary volumes in case of failure.
Login to Subscribe
Please login to set up your subscription.
Get support for your product, with downloads, knowledge base articles, documentation, and more.
Maximize your product competency and validate technical knowledge to gain the most benefit from your IT investments.
Submit a suspected infected file to Symantec.
Report a suspected erroneous detection (false positive).
Create and manage cases, manage licensing and renewals, submit threats, and enroll with Symantec Rewards.
Customer and Technical Support phone numbers and hours of operation.
User-to-user forums, blogs, videos, and other community resources on Symantec Connect.
Set default language
Do you wish to save this as your future site?