Loosely defined, a cluster is a group of machines that collaborate to provide highly available services to clients. The machines that comprise the cluster maintain their identity, but some level of abstraction is provided to clients of the service.

For example, a clustered Windows file server enables access to clustered file shares through a Common Internet File System. When a node fails, another node takes over, providing continued shares’ access to clients with some level of transparency.

DPM provides support for clustered resources on a network.

You must install a protection agent on all nodes of a cluster to support cluster protection. When you enable or disable a protection agent for a node on a cluster, you must enable or disable the agents for all nodes of the cluster.

The following procedure shows you how to configure protection for clustered resources.

To protect clustered resources

  1. In DPM Administrator Console, click Protection on the navigation bar.

  2. In the Actions pane, click Create a protection group.

  3. In the Create New Protection dialog box, in the Available members pane, choose the data you want to protect by selecting the check boxes.

    Clusters are listed in the Available members pane. You might need to click the plus sign (+) to expand the cluster.
  4. Click Next.

  5. Complete the Create New Protection Group Wizard.

  6. On the Summary page, click Create Group.

See Also