Business Recovery Service
Business Recovery Service

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Product Bulletin
        • [Product Discontinuation Notice] SDRS Synchronous Replication Discontinue Notice
      • Service Overview
        • BRS Infographic
        • What Is BRS?
        • Product Advantages
        • Application Scenarios
        • Usage Restrictions
        • Supported OSs
        • BRS and Other Services
        • Billing
        • Permissions Management
        • Product Concepts
          • Basic Concepts
          • Region and AZ
      • Getting Started
        • Asynchronous Replication (Restricted Use)
          • Overview
          • Preparation: Set Up a Disaster Recovery Network on the Cloud
          • Step 1: Create a Replica Pair
          • Step 2: Deploy the Cloud Disaster Recovery Gateway
          • Step 3: Download and Install the Proxy Client
          • Step 4: Create a Protection Group and Protected Instances
        • Synchronous Replication (for Installed Base Operations)
          • Configuration Process
          • Step 1: Create a Protection Group
          • Step 2: Create Protected Instances
          • Step 3: Enable Protection
      • User Guide
        • Permissions Management
          • Creating a User and Granting BRS Permissions
        • Asynchronous Replication (Restricted Use)
          • Managing a Replica Pair
            • Creating a Replica Pair
            • Changing the Name of a Replica Pair
            • Deleting a Replica Pair
          • Managing a Protection Group
            • Creating a Protection Group
            • Enabling Protection
            • Disabling Protection
            • Performing a Failover
            • Performing a Reverse Reprotection
            • Performing a Failback
            • Reprotecting a Protection Group
            • Creating a Disaster Recovery Drill
            • Deleting a Protection Group
          • Managing Protected Instances
            • Creating Protected Instances
            • Enabling Protection
            • Disabling Protection
            • Performing a Failover
            • Performing a Reverse Reprotection
            • Performing a Failback
            • Reprotecting a Protected Instance
            • Creating a Disaster Recovery Drill
            • Deleting a Protected Instance
          • Managing Disaster Recovery Drills
            • Deleting a Disaster Recovery Drill
          • Managing Clients
            • Installing a Disaster Recovery Gateway
            • Configuring a Disaster Recovery Gateway
            • Upgrading a Disaster Recovery Gateway
            • Installing a Proxy Client
            • Upgrading a Proxy client
            • Uninstalling a Disaster Recovery Gateway or Proxy Client
            • Batch Managing Proxy Clients
              • Batch Installing Linux Proxy Clients
              • Batch Installing Windows Proxy Clients
              • Batch Upgrading Proxy Clients
              • Batch Uninstalling Proxy Clients
              • Collecting Logs
        • Synchronous Replication Management (for Installed Base Operations)
          • Managing Protection Groups
            • Disabling Protection
            • Performing a Switchover
            • Performing a Failover
            • Performing Reprotection
            • Deleting a Protection Group
          • Managing Protected Instances
            • Modifying Specifications of a Protected Instance
            • Deleting a Protected Instance
            • Creating a Replication Pair
            • Attaching a Replication Pair
            • Detaching a Replication Pair
            • Adding a NIC
            • Deleting a NIC
          • Managing Replication Pairs
            • Creating a Replication Pair
            • Expanding Capacity of a Replication Pair
            • Deleting a Replication Pair
          • Managing DR Drills
            • Deleting a DR Drill
          • Managing Quotas
        • Appendixes
          • Configuring Disaster Recovery Site Servers
          • Configuring Production Site Servers
          • Port Description (Asynchronous Replication)
          • Changing the Password of User rdadmin
          • BRS Endpoints
      • Best Practices
        • Two-City Three-Center Disaster Recovery (BRS+CBR)
          • Solution Overview
          • Solution Principle
          • Resource and Cost Planning
          • Cross-AZ DR Implementation
            • Configuring Cross-AZ DR
            • Disaster Recovery Drill (Synchronous Replication)
            • Restoring Services If the Production Site Fails
          • Cross-Region Backup Implementation
            • Configuring Cross-Region Backup
            • Verifying the Configuration
            • Restoring Services When Both the Production Site and Its Cross-AZ DR Site Become Faulty
      • API Reference
        • Before You Start
        • API Overview
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • Getting Started
        • Synchronous Replication APIs
          • Job
            • Querying the Job Status
          • API Version
            • Querying API Versions
            • Querying a Specified API Version
          • Active-Active Domain
            • Querying an Active-Active Domain
          • Protection Group
            • Creating a Protection Group
            • Querying Protection Groups
            • Querying the Details of a Protection Group
            • Deleting a Protection Group
            • Changing the Name of a Protection Group
            • Enabling Protection or Enabling Protection Again for a Protection Group
            • Disabling Protection for a Protection Group
            • Performing a Failover for a Protection Group
            • Performing a Planned Failover for a Protection Group
          • Protected Instance
            • Creating a Protected Instance
            • Deleting a Protected Instance
            • Querying Protected Instances
            • Querying Details About a Protected Instance
            • Changing the Name of a Protected Instance
            • Attaching a Replication Pair to a Protected Instance
            • Detaching a Replication Pair from a Protected Instance
            • Adding an NIC to a Protected Instance
            • Deleting an NIC from a Protected Instance
            • Modifying the Specifications of a Protected Instance
            • Batch Creating Protected Instances
            • Batch Deleting Protected Instances
          • Replication Pair
            • Creating a Replication Pair
            • Deleting a Replication Pair
            • Querying Replication Pairs
            • Querying Details About a Replication Pair
            • Expanding the Capacity of a Replication Pair
            • Changing the Name of a Replication Pair
          • DR Drill
            • Creating a DR Drill
            • Deleting a DR Drill
            • Querying DR Drills
            • Querying Details About a DR Drill
            • Updating a DR Drill Name
          • Tag Management
            • Querying Protected Instances by Tag
            • Adding Protected Instance Tags in Batches
            • Deleting Protected Instance Tags in Batches
            • Adding a Protected Instance Tag
            • Deleting a Protected Instance Tag
            • Querying a Protected Instance Tag
            • Querying Tags of All Protected Instances in a Specified Project
          • Task Center
            • Querying Failed Tasks
            • Deleting a Failed Task
            • Deleting All Failed Tasks of All Protection Groups
            • Deleting All Failed Tasks of a Protection Group
          • Tenant Quota Management
            • Querying the Tenant Quota
        • Appendixes
          • Error Codes
          • Protection Group Status
          • Protected Instance Status
          • Replication Pair Status
          • DR Drill Status
          • Obtaining a Project ID
      • SDK Reference
        • SDK Overview
      • FAQs
        • Common Problems
          1. What Is DR?
          2. What Are the Advantages of BRS?
          3. What Are RPO and RTO?
          4. What Are the Differences Between DR and Backup?
          5. How Am I Billed for BRS?
          6. What Are the Differences Between Synchronous Replication and Asynchronous Replication?
        • Synchronous Replication (for Installed Base Operations)
          1. Do I Need to Manually Create DR Resources?
          2. What Can I Do When the EIP Cannot Be Pinged After I Perform a Switchover for a Protection Group Containing a SUSE Server?
          3. What Can I Do If the NIC Names of the DR Drill Server and Production Site Server Are Different?
          4. What Can I Do If hostname of the Production Site Server and DR Site Server Are Different After a Switchover or Failover?
          5. Why NICs of DR Site Servers Are Not Displayed After I Perform a Failover?
          6. What Are the Precautions If the Production Site Server Uses the Key Login Mode?
          7. What Should I Pay Attention to When Logging In to the Server After the First Time Ever I Executed a Switchover, Failover, or DR Drill?
          8. How Do I Use a Resource Package?
        • Asynchronous Replication
          1. How Do I Handle the drm Process Start Failure?
          2. Failed to Install and Configure Disaster Recovery Gateway When Process drm Exists But Port 7443 Is Not Listened
          3. What Can I Do If the Name of a Production Site Server or the Host Name Reported by the Gateway Is Incorrect and Always Displayed as "localhost"?
          4. What Can I Do If the Disaster Recovery Site VM Is Not Started After a Switchover?
          5. How Do I Obtain the Installation Package on a Production Site Server from the Gateway?
          6. How Do I Enable or Disable an ECS Firewall and Add a Port Exception to the Firewall?
          7. Why Can't I Find the Disaster Recovery Gateway When Associating a Replica Pair with It?
          8. Why Is No Production Site Server Displayed When I Create Protected Instances?
      • Videos
      • Glossary
      • General Reference
        • Glossary
        • Service Level Agreement
        • White Papers
        • Endpoints
        • Permissions