Version 3.3, a software-only release of Forge, provides new features, enhancements, and bug fixes.
For Release Notes documents that accompanied previous 3.x.x releases, visit the PlateSpin Forge 3 Documentation Web Site and go to Previous Releases at the bottom of the main TOC page.
Support for vSphere 5.1: This release provides support for the VMware vSphere 5.1 platform.
You can now select a vSphere 5.1 DRS Cluster or an ESXi 5.1 Server as your failback target.
See the “Supported Configurations” section in your User Guide.
Support for new workloads: You can now protect workloads running Red Hat Enterprise Linux (RHEL) 5.6-5.8, 6.0-6.2, and 6.3. This also covers the Oracle Enterprise Linux (OEL) distributions that are based on these Linux versions.
See the “Supported Configurations” section in your User Guide.
Additional ISO image leveraging WinPE 3.0: This release includes an additional PlateSpin boot ISO image (WindowsFailback-WinPE3.iso) for booting physical machines during failback. The new image leverages Microsoft Windows Preinstallation Environment (WinPE) version 3.0; use it when your target hardware is not supported by the existing boot ISO image (WindowsFailback.iso).
See the updated list of Boot ISO Images for Target Physical Machines in your User Guide.
Uniform .NET Framework requirement for Windows Workloads: Windows workloads that you intend to protect must have Microsoft .NET Framework version 2 or 3.5 SP1 installed before being inventoried by PlateSpin Forge.
Simple URL for pointing failback physical machine to PlateSpin Server: When using an ISO image to boot a physical machine as a failback target, it is now sufficient to specify only the hostname or IP address of the PlateSpin Server host (instead of typing http://<hostname_OR_ IP_address>/platespinforge).
Localization: Product documentation and the integrated WebHelp system accompanying this release have been localized for the following languages: Chinese Simplified, Chinese Tranditional, Japanese, German, and French.
Note that the English version of product documentation at the PlateSpin Forge 3 Documentation Web Site, which is being updated more frequently than the localized versions, should be considered the most current.
This release addresses the following bugs:
770964 (Windows) Problem running custom configuration script: An issue with how the product handled batch files prevented certain custom configuration scripts from running properly.
753157 Replication reports by e-mail not functioning properly: In some situations the removal of an email account that was listed as a recipient for PlateSpin Forge e-mail notifications might cause erratic behavior, such as ‘flooding’.
753449 (Windows) Workload hostname failing to change as required: In some cases the system might fail to assign a new hostname to the failover VM of a protected Windows Server 2008 workload when it was configured to join a domain.
770996 Wrong user in Events report: In Events reports, all system, instead of the actual username.jobs were erroneously shown as initiated by
762850 (Linux) Unable to use non-default shells: PlateSpin Forge failed to protect Linux workloads that had a command line interpreter other than the Bash shell, which PlateSpin Protect Server uses by default. You can now override the default shell used by PlateSpin Forge Server to execute commands on a Linux workload.See KB Article 7010676.
756871 (Linux) Incorrect sequence of 2 NICs on target after failover: In some cases an issue with target NIC mapping caused networking problems, such as the Novell eDirectory service binding to the wrong NIC.
773097 (Windows XP) Incorrect SCSI controller type on failover VM: VM replicas of Windows XP workloads were being assigned BusLogic SCSI controllers (instead of LSI SCSI controllers), which negatively impacted failover functionality.
768137 (Windows) Registry hives not replicating correctly during incrementals: In some cases an issue with how Windows Registry changes are handled in Windows Server 2003 and Windows XP might result in a mismatch between the Registries of a protected workload and its VM replica.
734525 (Linux) Unable to connect to port 3725: An issue with how communication with a Linux workload with two NICs was being managed might occasionally cause problems in connectivity.
744867 Problem inventorying NLB cluster hosts: In some cases an issue with the collection and processing of Windows Network Load Balancing (NLB) Cluster hosts might cause configuration problems on the VM replica.
722096 Failover VM info removed from inventory upon refreshing container: Occasionally, when the PlateSpin Server was unable to properly retrieve information from its container, a Refresh Container operation might result in the removal of information about the failover VM, negatively impacting the protection contract and failover functionality.
697049 Protection contract broken after vNIC's MAC address change: After setting up a protection contract, changing the MAC address of the failover VM’s virtual network adapter (either manually or automatically by the hypervisor) impaired the contract.
672815 Unable to start initial full replication due to missing vNIC-to-vNetwork mapping: In some situations during the Prepare Replication operation, a container refresh might interfere with the collection of inventory information about a newly created failover VM, impacting its network mapping and impairing the replication.
736280 Erroneous localhost.localdomain hostname in Linux failback: On failback, if the target hostname was set to No Change, the workload was assigned a localhost.localdomain hostname.
Support for the GUID Partition Table (GPT) standard: PlateSpin Forge supports the protection of workloads that use the GPT disk partition layout standard. However, targets are always configured to boot from BIOS using an MBR (Master Boot Record). This limitation has the following implications:
Max 2 TB per volume: The maximum size of a protected workload’s volumes is restricted to 2.19 terabytes, the maximum for a partition allowed by MBR.
Physical targets for failback must boot from BIOS: Most hardware vendors provide support for multiple disk partitioning standards; for information on how to configure a physical target to boot from BIOS, or to reconfigure GPT hardware to operate in “legacy mode” (with support for BIOS), see your hardware vendor documentation.
See also KB Article 7005452.
781217 (SLES 9) Issue with volumes mounted using UUIDs: An issue with how mount points on SLES 9 workloads are looked up and how PlateSpin Forge handles Linux volumes might negatively impact the protection of SLES 9 workloads with volumes that are mounted by UUIDs. This issue is being investigated.
Workaround: Modify the workload’s /etc/fstab configuration file to use device names instead of UUIDs for storage devices and partitions. See KB Article 7010812.
686911 Problems with file downloads from or uploads to datastore: Under certain conditions, where the protection target is a VMware DRS Cluster, the system might fail to upload or download a file, such as a boot ISO image. This negatively impacts a protection contract.
See KB Article 7008306.
595490 Preserving boot partition on failback causes failback to stall: In some failback scenarios, the system improperly allows you to preserve an active (or boot) partition on the target, preventing the target from booting properly. This issue is under investigation.
Workaround: In Failback Details, do not opt to preserve any boot partitions on the target.
698611 Full cluster replication failure under certain circumstances: If a Windows 2008 R2 Cluster protection contract is set up through the sync to an existing VM method, and if the active cluster node flips prior to the full replication, the full replication job fails.
See KB Article 7008771.
655828 Failure to mount NSS volumes: Upon failover or test failover, NSS volumes with snapshots enabled are not automatically mounted as expected.
See KB Article 7008773.
680259 (VMware 4.1) Poor networking performance by traffic-forwarding VMs: In some scenarios, the replica of a workload that is forwarding network traffic (for example, if the workload’s purpose is to serve as a network bridge for NAT, VPN, or a firewall) might show significant network performance degradation. This is related to a problem with VMXNET 2 and VMXNET 3 adapters that have LRO (large receive offload) enabled.
Workaround: Disable LRO on the virtual network adapter. For details, see the VMware vSphere 4.1 Release Notes. Sscroll down to the bulleted item Poor TCP performance....
No software RAID support for Linux workloads: PlateSpin Forge does not support Linux workloads with volumes on software RAID.
590635 Inconsistent failover results after upgrading: Following an upgrade to PlateSpin Forge, a failover operation might fail to complete or might not apply the correct failover parameters, such as the proper hostname and workgroup settings.
Workaround: Before performing a failover, run a replication.
581860 Browser exception in the Chinese edition of the product: Attempting to connect to the PlateSpin Forge Server with a browser that does not have a specific version of Chinese added might result in Web server errors. For correct operation, use your browser’s configuration settings to add a specific Chinese language (for example, Chinese [zh-cn] or Chinese [zh-tw]). Do not use the culture-neutral Chinese [zh] language.
Internet Explorer: Clicktab > zone > , then select the option for the feature.
Firefox: Clicktab, then select the option.
558937 Failure of block-level replications that use VSS (Windows): If you are using third-party VSS-based backup software, block-level replications might occasionally fail.
Workaround: Use blackout windows (see “Protection Tiers” in your User Guide).
611105 Missing protection contracts after upgrade: After upgrading your Forge appliance to version 3, protection contracts with workloads in aor a state might be missing from the user interface. This issue is under consideration for an upcoming fix.
Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc. reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the trade laws of other countries. You agree to comply with all export control regulations and to obtain any required licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. Please refer to the Novell International Trade Services Web page for more information on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export approvals.
Copyright © 2012 Novell, Inc. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher.
For Novell trademarks, see the Novell Trademark and Service Mark list.
All third-party trademarks are the property of their respective owners.