One of the many technologies that i work with on a regular basis is EMC RecoverPoint. Code 4.4 was just released and i wanted to share the new features and changes.
ProtectPoint 3.0 readiness
RecoverPoint now contains the infrastructure required to support ProtectPoint 3.0 when it becomes generally available. This readiness enables ProtectPoint 3.0 to support the protection of data located on XtremIO arrays. See the ProtectPoint 3.0 Solutions Guide and the ProtectPoint 3.0 Primary and Protection Storage Configuration Guide when they become available for more information on the RecoverPoint integration in ProtectPoint.
Volumes can be added to groups without journal loss
When adding replication sets to an existing consistency group, the journal history is retained.
RecoverPoint 4.4 has been qualified for use with IPv6 addressing. IPv6 is supported for all endpoints on the LAN, the WAN, gateways, subnets, VNX arrays, CX4 arrays, and XtremIO arrays.
EMC WAN Optimization Components (EWOC)
EWOC is not supported in RecoverPoint 4.4. If EWOC was enabled in a RecoverPoint version prior to 4.4, it will be automatically disabled during upgrade to RecoverPoint 4.4.
Multiple array support for XtremIO
The RecoverPoint/SE license now supports multiple XtremIO arrays per cluster.
Allow RecoverPoint to Manage Volume Access
Since XtremIO replica volumes are not managed by a RecoverPoint splitter, they are normally accessible, even when image access is disabled. External hosts accessing replica volumes can cause data corruption. From XtremIO 4.0.2 and later, RecoverPoint manages the access state of these volumes, and blocks write access to hosts, unless the volumes are in Image Access mode.
Many enhancements have been added to the RecoverPoint automatic registration mechanism. Among them, a call home event is now automatically sent to the EMC IB group whenever a cluster removed from or added to the system, and whenever a change is made to one of the details in the registration form.
Improvements in system feedback during image access
When accessing, failing over to, or recovering production from an image to a point in time that does not contain all of the replication sets that exist at the current point in time, new messages (and alerts) are now displayed to help users better understand the implications of image access.
New security features
Random SSH keys are generated during a new RecoverPoint installation and regenerated every time the regenerate_encryption_keys command is run.
Authentication secrets management
During RecoverPoint installation, you will be prompted for the local users’ security level. There is no default value. When Security Level is set to High, passwords of predefined users (admin, security-admin, and Boxmgmt) must be changed immediately. LDAP authentication is not affected.
Session inactivity timeout
By default, a RecoverPoint GUI session will time out after 10 minutes. After timeout, user will need to log on with password to access GUI again. Session timeout can be changed by user with security role privilege.