Skip to content
11:11 Systems
Rethink Connected
11:11 Systems11:11 Systems
  • Why 11:11
    • Submenu
      • Column 1
        • Cloud Console
          Cloud Console
          Compliance
          Compliance

      • Column 2
        • Global Regions
          Cloud Regions
          Catalyst
          Planning and Assessment

      • WHY CHOOSE 11:11
      • Overview
      • Leadership
      • News & Media
      •  
      • Careers
      • Technology Partners
      • Customer Stories
  • Products & Services
    • Products & Services
      • CLOUD
      • Cloud Overview
      • Public Cloud
      • Private Cloud
      • Object Storage
      • Cloud Labs
      • Colocation/Bare-Metal
      • BACKUP
      • Backup Overview
      • Veeam Backup
      • Microsoft 365 Backup
      • Managed Backup for Cohesity
      • DISASTER RECOVERY
      • DRaaS Overview
      • DRaaS for Veeam
      • DRaaS for Zerto
      • DRaaS for Azure
      • Autopilot
      • SECURITY
      • Security Overview
      • Continuous Risk Scanning
      • Managed SIEM
      • Managed EDR
      • Managed Firewall
      • CONNECTIVITY
      • Connectivity Overview
      • SD-WAN
      • Multi-Cloud Connect
      • Managed IP
  • Solutions
    • Solutions Submenu
      • INDUSTRY
      • Education
      • Financial
      • Government
      • Healthcare
  • Partners
    • Partners Submenu
      • Overview
      • Become a Partner
      • Partner Portals
  • Resources
    • Resources Submenu
      • Events
      • Webinars
      • News & Media
      • White Papers
      • Podcast
      • Data Sheets
      • Customer Stories
      • Innovation Blog
  • Support
    • Support Submenu
      • Contact Support
      • Product Documentation
      • API Documentation
Search:
  • Console Login
  • Contact
Header Right Menu
Free Trial
  • Why 11:11
    • Cloud Console
    • Compliance
    • Cloud Regions
    • Planning and Assessment
    • WHY CHOOSE 11:11
    • Overview
    • Leadership
    • News & Media
    • Careers
    • Technology Partners
    • Customer Stories
    • Blog
  • Products & Services
    • CLOUD
    • Cloud Overview
    • Public Cloud
    • Private Cloud
    • Object Storage
    • Cloud Labs
    • Colocation/Bare-Metal
    • BACKUP
    • Backup Overview
    • Veeam Backup
    • Microsoft 365 Backup
    • Managed Backup for Cohesity
    • DISASTER RECOVERY
    • DRaaS Overview
    • DRaaS for Veeam
    • DRaaS for Zerto
    • DRaaS for Azure
    • Autopilot
    • SECURITY
    • Security Overview
    • Continuous Risk Scanning
    • Managed SIEM
    • Managed EDR
    • Managed Firewall
    • CLOUD CONNECTIVITY
    • Connectivity Overview
    • SD-WAN
    • Multi Cloud Connect
    • Managed IP
  • Solutions
    • INDUSTRY
    • Education
    • Financial
    • Government
    • Healthcare
    • Column 2
  • Partners
    • Overview
    • Become a Partner
    • Partner Portals
  • Resources
    • Events
    • Webinars
    • News & Media
    • Whitepapers
    • Podcast
    • Datasheets
    • Customer Stories
    • Innovation Blog
  • Support
    • Contact Support
    • Success Center
    • API Documentation
  • Contact
  • Console Login
  • Free Trial
Tags: Disaster Recovery
Author: Jack Bailey
Date: November 9, 2012

Doubletake Replication – The Easy Way to Migrate Data to the Cloud

Using traditional methods to migrate applications and data to the cloud is typically time-consuming because production servers may have to be brought to a standstill in order for the migration to be executed. You also have to keep in mind your storage footprint – the larger the storage footprint, the longer the migration process will take. In fact, large system migrations can typically take hours or days to complete.

The cloud has become increasingly popular as a platform to host business applications because it offers a very cost-effective and flexible IT platform for many organizations. But how do you get your existing applications and data into the cloud? That’s a question we are frequently asked here at iland.

One way is to migrate your data from a file server using traditional data copying tools but you need to ensure that users cannot change any data while the migration is taking place otherwise changes to files that have already been copied will be lost.

You may also need to create a plan for recreating the file shares, permissions, compression, encryption and other settings on the new storage. This can translate into further hours of downtime even if everything works as planned the first time—and much longer if it doesn’t.

At first glance it may seem daunting but don’t worry – there are simple ways you can overcome these challenges and perform data migrations without disrupting production applications and shutting down their servers.

Double-Take Move and Double-Take Availability are migration and data replication tools that allow you to migrate physical and virtual workloads with complete data protection. Leveraging Doubletake replication not only allows you to address the migration process for moving applications and data into the cloud. It also offers a way to automatically avoid or correct any migration errors that may occur.

Doubletake replication offers exceptional application and data protection/migration in virtual and cloud environments. Thanks to a single unified management console it is easier to use than ever before.

Six Reasons Why Double-Take Availability Provides Superior High Availability

  1. Simplicity – Set It and Forget It data protection includes advanced features that automate the initial setup and ongoing management of your availability environment.
  2. Plug and Play Protection – Double-Take’s pre-configured Universal Virtual Recovery Appliance for physical and virtual environments gives you a plug and play option for extending the protection of your virtualized environment.
  3. Real-time Replication – Offers you superior protection compared to snapshots because it ensures the uninterrupted availability of critical application systems and virtually eliminates the potential for data loss.
  4. Zero Downtime during Migrations – Replication technology allows users to remain active while Double-Take Availability is recreating the production environment on the new system.
  5. Platform Independence – Double Take Availability allows you to cost-effectively protect more of your environment.
  6. Simplified Management – A unified console makes it easier to implement, manage and extract value from a powerful High Availability environment.

The following steps detail how to configure the Doubletake replication/migration process:

Step 1
Doubletake Replication Process

Data Sync Tabs
Always select these settings when setting up a replication set:

  • Start, Programs, Double-Take, Double-Take replication Console
  • Double-click over SOURCE server and login with local admin accounts
  • Right-click over SOURCE server and select, New, Replication Set from the menu
  • Name the replication set “sourceservername_newservername-rep”
  • Double-Click replication set and select files and folders stated in the Sync/move package

Right-click over replication set and select “Save”

Step 2
Right-click over Replication Set and select “Connection Manager”

Step 3
Select the “Mirroring” tabs and make sure the following is selected

Doubletake Replication 3

Step 4

  • Click the “Servers” tab and select the target
  • If a direct sync job do a one-to-one mapping
  • If the move package/sync job states to copy to another directory, select and “All to One”

(NOTE: Start Mirror on connect and Start replication on connection are marked off by default)

Step 5

  • Select “Connect” and the replication job will start
  • The job can be viewed from the SOURCE server

When job the Mirror status states “Idle”, the Disk Queue states “0” and the Replication Status reads “Ready” the job is complete

Doubletake Replication 6

Disconnect the replication set to break the connection/ complete the job

Doubletake replication through the use of Double-Take Move and Double-Take Availability offers a simple and convenient means to migrate data and applications to the cloud.

Category: DRaaSBy Jack BaileyNovember 9, 2012
Tags: Disaster Recovery

Author: Jack Bailey

Jack Bailey has been working with virtualization technology and customer implementations for nearly a decade.

Post navigation

PreviousPrevious post:Back to Basics with BackupNextNext post:Numbers Don’t Lie – See What Businesses Are Doing to Protect Their Data

Related Posts

Preparing for 2023 with 11:11 Systems: IT Trends in Security, Cloud, and More
February 1, 2023
11:11 Systems Wins 2022 Backup and Disaster Recovery Award from Cloud Computing Magazine
January 25, 2023
How businesses can respond to IT disruptions during the holiday season
How businesses can respond to IT disruptions during the holiday season
January 4, 2023
The CloudBytes Podcast: Season 3 is Here!
December 2, 2022
Celebrating Get To Know Your Customers Day
October 20, 2022
Experts: Prepare for Busy 2022 Hurricane Season
July 1, 2022
PRODUCTS & SERVICES
  • Cloud
  • Backup
  • Disaster Recovery
  • Managed Security
  • Connectivity Solutions
  • Compliance
COMPANY
  • Why 11:11
  • Customer Stories
  • Careers
  • Leadership
  • Technology Partners
  • News & Media
  • Contact Support
CLOUD REGIONS
  • North America
  • EMEA
  • APAC
CONNECT
  • LinkedIn
  • Twitter
  • Facebook
  • Youtube

© 2023 11:11 Systems Inc., All Rights Reserved | Privacy Notice

Go to Top
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}
PRIVACY POLICY AND COOKIE CONSENT
To provide the best experiences, we use technologies like cookies to store and/or access device information that allows us to process data such as browsing behavior. Not consenting or withdrawing consent, may adversely affect certain features and functions. By clicking Accept, closing this message, or continuing to browse, you consent to these technologies and accept our Privacy Notice.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}