If you want to protect applications (such as databases) on a host, you need to add the host for DR protection. This operation instructs the administrators to add hosts to the DR management system on eReplication. The hosts provide necessary resources for DR.
Before discovering hosts for Oracle 12c RAC or later, ensure that the Oracle RAC cluster service is running properly.
IP addresses of the hosts where protected objects reside and usernames and passwords configured during the eReplication Agent replication have been obtained.
Protected Object |
Description |
|---|---|
|
Add the hosts where databases reside. |
If you uninstall and reinstall the eReplication Agent on a host, you need to add the host again after the eReplication Agent is reinstalled.
Hosts that need to be managed must be added.


In the step of customizing scripts in the protection and recovery processes, hosts with Agentless enabled do not support third-party scripts.

Parameter |
Description |
Value |
|---|---|---|
IP Address |
IP address of the host. |
[Value range]
[Example] 192.168.10.11 |
Port |
Communication port of the eReplication Server and Agent. |
[Value range] The value ranges from 1 to 65535. The default value is 59526. The default value is provided in the default row only. You can copy the information in the default row. |
Username |
Username configured during the eReplication Agent installation. |
It can be obtained from the host administrator. |
Password |
Password configured during the eReplication Agent installation. |
It can be obtained from the host administrator. |
If an added host does not need to be discovered, click Delete to delete it. The default information row cannot be deleted.
in the operation area in the row where the host resides, and set the reporting parameters as described in Table Alarm reporting parameters.
Parameter |
Description |
Value |
|---|---|---|
Type |
Type of the SNMP protocol. SNMP v3 is used by default and cannot be changed. |
The system uses SNMP v3 for communication by default. |
Retry Count |
Times for resending the SNMP operations. If this number of times is exceeded, the SNMP operation will be abandoned. |
[Value range] The value ranges from 0 to 5. The default value is 3. |
Timeout Duration |
Time that needs to be waited after the protocol message is sent. |
[Value range] The value ranges from 0 to 5. The default value is 5. |
Port |
SNMP v3 alarm reporting port of the host. |
[Value range] The value ranges from 1 to 65535. The default value is 161. |
Username |
Username used to report alarms based on SNMP v3 when adding a host on the eReplication Server. The default username is the same as that configured during the eReplication Agent installation. After the eReplication Agent is installed, the default alarm reporting username is rdadmin. |
[Value range] The username contains 1 to 64 characters. |
Environment Name |
This parameter does not need to be manually configured. |
- |
Environment Engine ID |
This parameter does not need to be manually configured. |
- |
Authentication Protocol |
Protocol used for verifying messages. The parameter value can be HMACMD5, HMAC_SHA1, HMAC_SHA2(SHA256) or no protocol. |
[Example] HMAC_SHA2 NOTE:
The default value is HMAC_SHA2(SHA256). HMACMD5 or HMAC_SHA1 is an insecure protocol which may cause security risks. Therefore, HMAC_SHA2(SHA256) is recommended. |
Authentication Password |
If the authentication protocol is used to verify messages, you need to set the authentication password. The default password is the same as that configured during the eReplication Agent installation. |
- |
Data Encryption Protocol |
Encryption protocol used for encapsulating data. The value can be DES or AES, or no encryption.
|
[Example] AES NOTE:
The default value is AES. DES is an insecure protocol which may cause security risks. Therefore, AES is recommended. |
Data Encryption Password |
If the encryption algorithm is used for encapsulating data, you need to set the data encryption password. The default password is the same as that of the eReplication Agent. |
- |
Parameter |
Description |
Value |
|---|---|---|
Name |
Name of the host group. |
[Value range]
[Example] hostgroup |
Operating System iSoft |
Host groups support Windows, RedHat, HP-UX, SUSE, AIX, Solaris, Oracle Linux, and iSoft. |
[Example] Windows |
Cluster Type |
You need to select a cluster type from the drop-down list. Host groups running different operating systems support different cluster types.
If the operating system of a host group is iSoft, the cluster type can only be Oracle RAC. |
[Example] Oracle RAC |
After hosts are added, you can refresh, modify, and delete host information. For details about subsequent operations, see Table Related operations.
Operation Name |
Related Operation |
Prerequisite and Result |
|---|---|---|
Modify information about a host or host group |
Select the host or host group that you want to modify and click More > Modify on the Operation list. Modify the host or host group name and the authentication information or alarm reporting information of the host. Then click OK. |
If you change the authentication or alarm reporting information of a host, synchronize the latest information toeReplication in time to ensure successful running of subsequent DR protection services. |
Add a host to a host group |
If you want to add a host to the host group, click More > Add to Host Group on the Operation list. And then click OK. |
If the application environment is a cluster, you need to add all the hosts in the cluster to the host group. |
Remove a host from a host group |
If you want to remove a host from the host group, click More > Remove from Host Group on the Operation list. And then click OK. The host is removed from the host group, but still exists at the site. |
If a host in the cluster is adjusted or does not belong to the cluster again, you need to remove the host from the original host group. |
Delete a host that is no longer used |
If you want to delete a host that has not been added to a host group, click More > Delete on the Operation list. The host is deleted from the site. |
Perform this operation when a host is no longer needed. |
Delete unnecessary host groups |
If you want to delete a host group, select the host group, click More > Delete on the Operation list. And click OK. |
Perform this operation when a host group is no longer needed. |
Export logs |
In the row of the host whose eReplication Agent logs need to be exported, click More > Collect Log on the Operation list. And then click OK. View the background task to check whether the logs are collected successfully. In the row of the host whose logs have been collected, click More > Export Log on the Operation list. Export logs to a local path. |
If anomalies occur on a protected object (such as a database) during DR protection or recovery, you can export the logs of the eReplication Agent on the host where the protected object resides to a local path. You can analyze the logs to locate and handle the anomalies. |
Refresh hosts |
|
eReplication automatically queries information about added hosts every 12 hours to ensure the host information in eReplication is consistent with the actual host information. If the host information is changed, you need to refresh the information in eReplication immediately. If the application environment is a cluster and information about hosts in the host group is changed, you can refresh the host group to refresh information about all the hosts in the host group. |