Protect already protected volume on a smaller pool

Hi everyone,
We currently use DPM 2010 to protect data on to a 20TB array. We have installed a new array on a NAS and attached via iSCSI, this array is 4TB.
I would like to protect some volumes and system states to the smaller 4TB NAS which are already protected on the larger 20TB array.
Unless I'm missing something, this doesn't seem possible.
Let me make this clear, I want to protect some of my volumes and system states on to another array, so that they're protected on two arrays. Obviously I'll need to be able to modify the days protected on the smaller array too, or just keep one full backup.
Can this be done, if so how?
Thanks,
Thanasi.

1) You can use custom volume
Defining Custom Volumes
http://ystartsev.wordpress.com/2011/08/08/dpm-custom-volumes/
http://ystartsev.wordpress.com/2011/09/16/multiple-schedules/
2)you can use robocopy to copy data from one array to another
may reverse :)
Colocate data from different protection groups on disk
Have a nice day !!!

Similar Messages

  • Manage-bde Status states "Protection Status: Protection Off"

    I have many machines that are encrypted, but say "Protection Off" and are therefore failing compliance in MBAM 1.0.  Here is what their status looks like:
    P:\>manage-bde -status -cn AAAAAA
    BitLocker Drive Encryption: Configuration Tool version 6.1.7601
    Copyright (C) Microsoft Corporation. All rights reserved.
    Computer Name: AAAAAA
    Disk volumes that can be protected with
    BitLocker Drive Encryption:
    Volume C: [OSDisk]
    [OS Volume]
    Size: 297.60 GB
    BitLocker Version: Windows 7
    Conversion Status: Fully Encrypted
    Percentage Encrypted: 100%
    Encryption Method: AES 256 with Diffuser
    Protection Status: Protection Off
    Lock Status: Unlocked
    Identification Field: None
    Key Protectors:
    Numerical Password
    TPM And PIN
    If I run the command: manage-bde -on c: -cn AAAAAA
    ....it seems to fix the problem.  See how now the protection is on?
    P:\>manage-bde -on c: -cn AAAAAA
    BitLocker Drive Encryption: Configuration Tool version 6.1.7601
    Copyright (C) Microsoft Corporation. All rights reserved.
    Computer Name: AAAAAA
    Volume C: [OSDisk]
    [OS Volume]
    NOTE: This command did not create any new key protectors. Type
    "manage-bde -protectors -add -?" for information on adding more key protectors.
    NOTE: Encryption is already complete.
    Turned on BitLocker protection by enabling key protectors.
    P:\>manage-bde -status -cn AAAAAA
    BitLocker Drive Encryption: Configuration Tool version 6.1.7601
    Copyright (C) Microsoft Corporation. All rights reserved.
    Computer Name: AAAAAA
    Disk volumes that can be protected with
    BitLocker Drive Encryption:
    Volume C: [OSDisk]
    [OS Volume]
    Size: 297.60 GB
    BitLocker Version: Windows 7
    Conversion Status: Fully Encrypted
    Percentage Encrypted: 100%
    Encryption Method: AES 256 with Diffuser
    Protection Status: Protection On
    Lock Status: Unlocked
    Identification Field: None
    Key Protectors:
    TPM And PIN
    Numerical Password
    My question is: Why are so many machines in this state, and is it safe for me to just run the "manage-bde -on c: -cn AAAAAA" on them or could it cause problems?

    I mean to say, it's the MBAM agent who sends information to the MBAM Server about the recovery keys and TPM information. So when you are using manage-bde commands for encryption, the recovery keys will not get stored to the MBAM DBs.
    What you need to do is to start the encryption with manage-bde and then at the next client wake up frequency which you have set in your environment, MBAM Agent will send the recovery information to the MBAM web servers an dthen the recovery keys will be
    stored to the MBAM DBs.
    But in this case also, TPM ownership information will not get stored to the MBAM DBs. For that you need to run a script if you have saved the TPM information in Active Directory. I have posted the script on Technet Gallery.
    Let me know if you have any more issues.
    Gaurav Ranjan

  • Need help with developing a small pool game

    Hi,
    I want to develop a small pool game ....Im using the netbeans ide and ....what I have so far is 2 classes ......Pool and GUI
    Basically the main method is in the Pool class.......withing main I created a new GUI object .....which in turn creates a frame.
    I now want to custom code a rectangle and make it a container for the pool table and also colour it......the thing is can I do animations in a frame and by using independant classes rather than using an applet?
    I know this may be innefficient but I want to create a standalone pool game that uses custom objects and classes for the various tasks. I was just wandering if it was possible to do drawings the way i am saying without using an applet? Its just all the tutorials I see .....well all the code seems messy and lumped together in the one place ....and I basically want things such as a independant ball class and perhaps a painter custom interface that colours rectangles.
    Any advice would be appreciated
    David

    Thanks for the advice .....The thing is I understand pretty well what is needed .....and I have programmed small applications that take bookings for a hotel and and a library ....Im am familiar with references, arraylists and the alike and im also reading about the java collections interface ......I have also coded a simplistic program in the past that basically a ball was bouncing of the sides of a container and made a sound when it hit the edge(this used threads i believe). However it has been a while ......and although I am happy with some of the concepts of java........we did not do any java graphics programming at college. In all fairness though I learned the importance of using classes properly and in a way thats why im finding it so difficult to code even basic graphic movement that Im happy with as the tutorials Ive seen have everything lumped in one place(as mentioned) and trying to make them more modular can be difficult. As far as I know from coding some basic applets they are generated on the client side to enable everyone with different platforms to view stuff over the web. I dont want applets as I dont at this time want to distribute any of my meager programs over the web :-)). It is good to know that I can use threads and such independent of the applet class........I know my question may be naive but 100% of the tutorials I saw invoked the applet class in some way and emplied in a way that it was essential.......I thought there would be a way to do it without using applets but was not 100% sure which is why I asked.
    I will just need to try and find one guide now that actually shows me how to do what im asking:-)
    Cheers
    David
    I also have 3 java books.......each of which concentrate on graphics by use of applets ....im going to look them out again as they might contain something useful .....to be honest though they were a bit of a waste of money lol(well 2 of them were)

  • Virtual server is already managed by another virtual server pool

    I was trying to register a server to a server pool on OEM 10.2.0.5 console, on the first try it never completed the registration, it errored out. After doing 'clear operation error' I try to register the same server, Now I get "virtual server is already managed by another virtual server pool". Does any one ran into similar situation? How do I clear this? Thank you.

    user589547 wrote:
    I was trying to register a server to a server pool on OEM 10.2.0.5 console, on the first try it never completed the registration, it errored out. After doing 'clear operation error' I try to register the same server, Now I get "virtual server is already managed by another virtual server pool". Does any one ran into similar situation? How do I clear this? Thank you.It's fairly simple to clear. First, stop the ovs-agent on the server:
    # service ovs-agent stopThen, remove the local ovs-agent database:
    # rm -rf /etc/ovs-agent/db Then, start the agent again:
    # service ovs-agent startThe agent will now be reset back to an unconfigured state.

  • Is my macbook already protected from viruses?

    does my macbook come equipted with a virus fire wall or some type of protection?

    1. This is a comment on what you should and should not do to protect yourself from malicious software ("malware") that circulates on the Internet. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    If you find this comment too long or too technical, read only sections 5, 6, and 10.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
       3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandboxing security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. The built-in security features of OS X reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "Trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you always stay within a safe harbor of computing practices. How do you know what is safe?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is unsafe.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are outside the safe harbor, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe. For instance, if a web page warns you that Flash is out of date, do not follow an offered link to an update. Go to the Adobe website to download it, if you need it at all.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    "FREE WI-FI !!!" networks in public places are unsafe unless you can verify that the network is not a trap (which you probably can't.) Even then, do not download any software or transmit any private information while connected to such a network, regardless of where it seems to come from or go to.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use one of the free anti-virus products in the Mac App Store — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    To recognize malware, the software depends on a database of known threats, which is always at least a day out of date. Most of the real danger comes from highly targeted "zero-day" attacks that are not yet recognized.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. An anti-malware product from the App Store, such as "ClamXav," doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    An anti-virus app is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    Anti-virus software may be able to tell you which particular trojan it is, but do you care? In practice, there's seldom a reason to use the software unless an institutional policy requires it.
    The ClamXav developer won't try to "upsell" you to a paid version of the product. Other developers may do that. Don't be upsold. For one thing, you should not pay to protect Windows users from the consequences of their choice of computing platform. For another, a paid upgrade from a free app will probably have the disadvantages mentioned in section 7.
    9. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.
    10. As a Mac user you don't have to live in fear that your computer may be infected every time you install software, read email, or visit a web page. But neither should you assume that you will always be safe from exploitation, no matter what you do. The greatest harm done by security software is precisely its selling point: it makes people feel safe. They may then feel safe enough to take risks from which the software doesn't protect them. Nothing can lessen the need for safe computing practices.

  • My online bank has recommended we turn on Firewall and download an anti-virus programme.  Understood MAC is already protected please advise

    I have a MAC desktop version 6.1.6.
    My online Bank has recommended Firewall turned on and download a separate anti-virus programme.
    Please advise and we understood MAC  has anti-virus built in
    Kind regards
    Karinband

    Do not download anti-virus programs for your Mac.   They do not need them.   Have you got Java disabled.   If so turn it on again for the duration of your work with the bank, then torn it off.
    This is what to do with iMacs 10.6.8 or earlier.   Incidentally, you really should update your profile, questions may apply to some versions and not others.   Your iMac cannot be 6.1.6.

  • Data Protection Manager - Protection Groups

    Hi Everyone,
    I want to reorganize my DPM 2010 configuration.
    I have a tape library directly connected to a DPM 2010 server, wich contains 22 usable tapes. At the moment i have about 25 servers, devided in 5 Protection Groups. Tape co-location is enabled.
    I figured that all selected data sources of all servers in all protection groups, fit on 1 tape. However, with co-location enabled, DPM sometimes fills up a previously used tape, before using a free or expired one.
    Now my question;
    Is it smart to put all the 25 servers in 1 single protection group and disable co-location?
    In that way everyday only a single tape is used for all the backups. Also the weekly backups will only use 1 tape. It creates a nice overview for me. All servers can use the same schedule.
    What is your opinion on this?

    Think that it helps you
    DPM 2012 - Backup Protection Group to Tape
    http://social.technet.microsoft.com/Forums/en-US/32091d07-2e08-4859-9b68-92c7c4708a38/dpm-2012-tape-colocation-options-media-pools?forum=dpmtapebackuprecovery
    https://blogs.technet.com/b/dpm/archive/2012/05/14/things-you-can-do-to-help-data-protection-manager-utilize-your-tapes-full-capacity.aspx
    http://technet.microsoft.com/en-us/library/ff399230.aspx
    Have a nice day !!!

  • Formcalc: access = "protected" puts protected literal in field.

    Hi. I have a form that has a field, EmpNbr, appearing twice. The two fields share the same name with Data Binding set to Use Global Data. I don't want the second field to be enterable so I set the field to protected using FormCalc, see clip below. When viewing the form in Preview PDF it is indeed protected, the cursor skips the field. However, both fields show the literal protected as the initial field value. Why is the literal protected being populated and how can I prevent it?
    If I change the access to readOnly, that becomes the initial value.
    It doesn't help if I change FC to JS.
    Below is a clip of the access command --
    topmostSubform.Page1.EmpNbr[1]::calculate - (FormCalc, client)
      $.access = "protected"
    Thanks for any insight.
    Gary

    The calculate event is "special" and is setup to return whatever the script on the event does back to the caller (in your case the field). So if you add a $.rawValue to the end of your script it will return the current value of the field and all shoudl be good. Note that if you used a different event then this woudl not happen as Calculate is the only event that operates this way.
    So your script shoudl be:
    $.access = "protected"
    $.rawValue
    Hope that helps
    Paul

  • Which License is good OEM, OLP or Volume Licensing for small company

    Dear Admins,
    Actually I am setting up a lab for a small company with 25 users. Confused which license to purchase. Vendor sent us quotation in which he mentions we have to purchase "HP Server DL-380 -G8 Intel Xeon 2.5GHZ " in order to install windows server
    2008 R2 OEM Edition CD. Actually I just want to know. Can't we purchase  a assembled computer/Machine and purchase Windows Server 2008 R2 OEM CD  for successful implementation?. Now, My question to you is. What is this OLP and OEM. Does OLP mean
    we can install Windows Server in assemebled computer or machine and OEM means only dedicate company machine is capable to install OEM edition, Just confused, Please let me know. It is just a small company with 25 users. What do you recommend. Thank you for
    your support.
    Best Regards,
    Fahad Ahmed. 

    Hi Fahad,
    Couple of things to remember as well
    OEM licences comes with the machine probably you have seen laptops and desktop has a windows key sticker that's an OEM license. Only limitation with OEM is you can't use OEM license anywhere else then the machine you have bought it with. If an OEM license
    machine dies license will die as well.
    With volume license you have the freedom to move around the license. If you have only one license on one machine at one time.
    Also when you buy a windows server license it comes with 5 user CALs. So that's why you have to buy 20 more.
    Now if you want to know what are the CALs, so CAL is a Client Access License require for a
    user/device to access windows server. For example if you have a user and he wants to access share files or printer from the server you will require a user CAL. So if 25 users will access the Server you will require 25 CALs.
    Best thing to do is to speak with your account Manager from Dell or HP regarding the license side as normally they are really good in helping.
    Hope this helps :)

  • How to use protect and protect

    how to use protect and endprotect for two different element.
    iam using one element for 'tax' and one for 'item total'
    i wnt to print two elements in one page only.

    Hi
    What does 'Elements' mean for u?
    Text Elements?
    You can try to manage it in print program:
    CALL FUNCTION 'CONTROL_FORM'
      EXPORTING
        COMMAND = 'PROTECT'.
    CALL FUNCTION 'WRITE_FORM'
      EXPORTING
        ELEMENT = 'ELEMENT1'.
    CALL FUNCTION 'WRITE_FORM'
      EXPORTING
        ELEMENT = 'ELEMENT2'.
    CALL FUNCTION 'WRITE_FORM'
      EXPORTING
        ELEMENT = 'ELEMENTN'.
    CALL FUNCTION 'CONTROL_FORM'
      EXPORTING
        COMMAND = 'ENDPROTECT'.
    Max

  • FDM - Integration Settings - Data Protection Switch - Protection Value

    Hello HFM Group,
    I need some quick guidance. There are 3 HFM accounts that I want to protect against FDM Exports
    Three accounts I want to protect:Op_AirOp_VehOp_Tra
    The Protection Operation is set at " = "
    The Protection Value is set as: Op_Air; Op_Veh; OpTra
    My problem seems to be that the protection value only works when I list 1 account in the Protection Value box. I.E. It will protect the Op_Air account if it's the only account listed. But if I list the 3 accounts delimited by a semicolon as shown above it doesn't protect any of them. Surely there is a way to specify multiple values WITHOUT having to designate a common UD1 for these 3 accounts in HFM?
    Can't I list multiple values in the Protection Values box? If so what is the syntax to separate the values? Evidently, it's not semi-colon or comma....Any Ideas
    FYI - I know I could designate a common UD1 and place them on all 3 of these accounts but I am trying to avoid this direction.
    Thanks,
    James

    Hello,
    Currently right now the FDM Data Protection option is limited to a single value.
    The way the data is handled between the two software products is a current limiting factor.
    Thank you.

  • Time Machine falsely says my disk volume is too small

    I have several Fusion VMs which I am excluding from TM backup. But when I select "Change Disk..." in TM, it tells me that the disk I wish to use is too small. When, in fact, it is about 4 times larger than the data I wish to back up. It seems to be using the entire contents of my main volume (including the excluded Fusion VMs) when calculating the required size of the new TM target disk. Is this a TM bug? Is there a work around?

    This thread might be of interest:
    http://discussions.apple.com/thread.jspa?messageID=8002977&#8002977

  • Volume licensing for small schools

    I work for a private university (3,600 students), and this new method of application distribution needs to be better thought out. We don't need 20 licenses for any products. We've got just a handful of Final Cut Pro installs for example. We don't need 20 of them.
    Apple's solution is to put a separate account for every Mac on campus. No way that's going to happen. Not only would it be a nightmare, but the money end of things would become incredibly complicated.
    What would solve the problem is to let us buy apps multiple times. The money would be centralized and licensing requirements could be satisfied.
    Apple needs to rethink this whole thing for smaller users.

    Hi Fahad,
    Couple of things to remember as well
    OEM licences comes with the machine probably you have seen laptops and desktop has a windows key sticker that's an OEM license. Only limitation with OEM is you can't use OEM license anywhere else then the machine you have bought it with. If an OEM license
    machine dies license will die as well.
    With volume license you have the freedom to move around the license. If you have only one license on one machine at one time.
    Also when you buy a windows server license it comes with 5 user CALs. So that's why you have to buy 20 more.
    Now if you want to know what are the CALs, so CAL is a Client Access License require for a
    user/device to access windows server. For example if you have a user and he wants to access share files or printer from the server you will require a user CAL. So if 25 users will access the Server you will require 25 CALs.
    Best thing to do is to speak with your account Manager from Dell or HP regarding the license side as normally they are really good in helping.
    Hope this helps :)

  • Migrating Protection group to new storage pool

    Hello all running DPM 2012. The environment was setup prior to my arrival and it was setup with 10 1.5TB storage pools.  I heard the thinking was this was the recommended size for storage pools.  Problem is now we are/have run out of disk space
    on those storage pools and jobs are failing with "DPM does not have sufficient storage space available on the recovery point volume to create new recovery points (ID 214)"
    I have created new 4 new storage pools of 10TB each and I want to know how I can migrate the protection group data to the new storage pools and have the protection group use the new storage pool moving forward.  I want to empty the smaller storage pools
    so I can kill them off and create larger storage pools.
    Unfortunately the GUI does not allow me to point to specific storage pools, it should, and I'm not familiar with DPM Shell commands.
    Any suggestions would be appreciated.

    Hi,
    http://technet.microsoft.com/en-us/library/dd282970.aspx
    The following commands can be used with the ntdisk number as seen in either the get-DPMDISK output, the Windows Disk Management GUI or DPM Management - Disks GUI.  In my example disk-0 is the system/boot disk and not used by DPM storage pool.
    EXAMPLE These commands show the migrations going from NTDisk 1,2,3,4,5,6,7,8,9,10 to NTDisks 11,12,13,14 
    $source = get-dpmdisk -dpmserver DPM-SVR-NAME | where {1,2,3,4,5,6,7,8,9,10 -contains $_.ntdiskid}
    $source
    $destination = get-dpmdisk -dpmserver DPM-SVR-NAME | where {11,12,13,14  -contains $_.ntdiskid}
    $destination
    Once you are satisfied the outputs are what you want, then run the following to do the migration:
    MigrateDatasourceDataFromDPM.ps1 -DPMServername DPM-SVR-NAME -source $source -destination $destination
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

  • Creating Protection Group Fails with Error:360 The operation failed due to a virtual disk service error

    Hello
    I'm setting up a DPM server (2012 R2) at a remote site; everything goes well with no issues until a protection group is created, at which point I get the following error;
    Create protection group: Protection Group 1 failed:
    Error 360: The operation failed due to a virtual disk service error
    Error details: The system cannot find the file specified
    Recommended action: Retry the operation.
    The environment is as follows;
    - Virtual Machine Running Server 2008 R2 Fully updated
    - Storage Pool is an iSCSI connection Thick Provisioned 1TB GPT and shows in Disk Management with no issues.
    - Have connected to Session 0 (console) 
    - Error log shows The provider did not receive a Plug and Play service notification for the volume. volume=10  for the VDS Dynamic Provider
    Can Anyone Help?
    Thanks
    .Adam Langdon

    Hi,
    Disk defrag is initiated when a volume shrink is attempted. See if there is any problem defragging a volume and correct any problems doing that.
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT]
    This posting is provided "AS IS" with no warranties, and confers no rights.

Maybe you are looking for

  • Display problem (washed out) on MBP 13" late 2011

    I have a Macbook Pro 13" unibody late 2011, i 5 (bought it at 1200 usd). Since last year I have been experiencing an over heating issue and noisy machine or fan (I cant distinguish clearly), even sometimes the machine still works and makes noisy soun

  • Asset and Serial Inventory

    Hello, Where does the ZCM10 Inventory Asset Tag and Serial Number fields come from ? (The SMBIOS ? Which fields ? ) We purchase generic INTEL PC's from a local pc vendor (not a dell, or ibm). Currently the only asset/serial information is attached ad

  • Upgrading from the trial version to the full version

    I purchased the full version of LC Designer ES4 after loading the trail version.  I now have a license key but can't find where or how to install the license key to make my LC licensed.  Can anyone point me in the right direction and provide instruct

  • My time capsule disappear suddenly

    my time capsule suddenly disappeared from the network, no green nor amber light in the front, but in the rear, the all the hardwire ports blinking a tiny little green light. it has no change even i try to restore to factory setting. i just connect it

  • Please help, video lag

    'm on a mac running leopard. The following TRULY baffles me. So im a sound designer and i have an external sound card i use for my work. When i watch flash videos with my built in sound card (like youtube videos) everything is fine.... ... but when i