SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
VMware vSphere
Replication 5.5
Overview

®

Simple and Effective Virtual Machine Protection
TEC H N I C A L W H ITE PA P E R
VMware vSphere Replication 5.5 Overview

Table of Contents
Introduction.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
What Is vSphere Replication? .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
How Does It Work? .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Simplicity Without Sacrificing Functionality.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
Recovering a Virtual Machine  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
. .
Retention of Multiple Points in Time.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
Next Steps .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
Protect Your Virtual Machines from Loss and Downtime
with vSphere Replication  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
. .
Additional Documentation .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
VMware Contact Information.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
Providing Feedback.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
About the Author .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13

TECH N I C AL WH ITE PAPE R / 2
VMware vSphere Replication 5.5 Overview

Introduction
A fundamental part of protecting IT is ensuring that the services provided by virtual machines are resilient and
robust at all levels of the compute stack, from hardware through to the application.
VMware vSphere® Replication is a feature of the VMware vSphere platform. It is designed to augment the
recovery capabilities of the vSphere platform by providing a built-in ability to continually replicate a running
virtual machine to another location. vSphere Replication creates a copy of a virtual machine that can be
stored locally within a cluster or at another site, providing a data source for rapidly restoring a virtual machine
within minutes.
vSphere Replication augments offerings in the vSphere availability protection matrix. It provides a solution
that enhances business continuity planning, complementing both backup and full disaster recovery, without
introducing the complexity and cost of a complete storage array–based replication configuration.
vSphere Replication enables configuring replication on a per–virtual machine basis and significantly rounds
out the capabilities of protection offered by vSphere.
This paper will help users understand what VMware vSphere Replication is, explain some of the benefits of its
features, and provide an overview of how it works to protect virtual machines against failure.

What Is vSphere Replication?
vSphere Replication is a feature of the VMware vSphere platform. It copies a virtual machine to another
location, within or between clusters, and makes that copy available for restoration through the
VMware vSphere Web Client or through the orchestration of a full disaster recovery product such as
VMware® vCenter™ Site Recovery Manager™.
vSphere Replication protects the virtual machine on an ongoing basis. It replicates to the copy only the changes
that are made to the virtual machine. This ensures that the virtual machine remains protected and is available for
recovery directly from the vSphere Web Client without requiring use of an external tool.
vSphere Replication is provided as a no-charge component of all eligible vSphere licenses, ranging from
VMware vSphere Essentials Plus Kit to VMware vSphere Enterprise Plus Edition™. As with backups through
VMware vSphere Data Protection™, protecting a virtual machine is a critical function of a hypervisor platform
for the datacenter.
Unified management of vSphere Replication is offered via the next-generation vSphere Web Client. This
provides a common and unified screen for all aspects of virtual datacenter management, including many
aspects of protection such as replication, backup and restore.
Some replication technologies provide mere copies of a virtual machine at a remote site without any
consideration for the consistency of the application data within the virtual machine. vSphere Replication can be
configured to ensure consistent application data, along with virtual machine data, with one simple click when
configuring a virtual machine for replication.

TECH N I C AL WH ITE PAPE R / 3
VMware vSphere Replication 5.5 Overview

Figure 1. Integrated with the vSphere Web Client

Automatic integration with Microsoft Volume Shadow Copy Service (VSS) ensures that applications such as
Microsoft Exchange Server and Microsoft SQL Server databases are quiescent and consistent when replica data
is being generated. A quick call to the virtual machine’s VSS layer flushes any outstanding application writes to
ensure that the data that is replicated is static and fully recoverable.

Figure 2. Application Consistency via VSS

There are no application agents or administration required for this process. Application consistency is inherent
to the copies made by vSphere Replication and is achieved through communication with the Microsoft Windows
operating system (OS) via the installed VMware Tools™.
vSphere Replication also enables administrators to choose retention of historical replications as potential points
in time to revert a recovered system. When configuring replication for a virtual machine, administrators simply
select whether or not to retain multiple points in time; they then can choose how many historical copies are to
be retained and for how many days. They can retain a maximum of 24 points in time and can customize the
retention configuration. For example, a user might choose to retain one copy daily for as many as 24 days,
24 copies throughout a day for only one day, or any other selection that their requirements might dictate.

TECH N I C AL WH ITE PAPE R / 4
VMware vSphere Replication 5.5 Overview

How Does It Work?
vSphere Replication is a deeply integrated component of the vSphere platform. It is the only true
“hypervisor-level” replication engine available today. Changed blocks in the virtual machine disk(s) for a
running virtual machine are sent to a secondary location, where they are received by a virtual appliance that
writes them to an on-disk redo log. Only when that redo log is complete and all blocks in a given replication
are received is that set of data applied to the virtual machine disks for the offline (protection) copy of the
virtual machine.

VM

VM

VM

VM

VM

Figure 3. Replicate Virtual Machines’ Changed Blocks

vSphere Replication consists of an agent that is a part of the core vSphere 5.5 installation package on each host,
along with a set of virtual appliances that are deployed from the management interface. From a conceptual
perspective, the agent is responsible for both tracking and sending changed data from a running virtual
machine; the remote appliance receives the replication and applies it to the offline disk files for the virtual
machine. The vSphere Replication appliance also manages replication, which enables the administrator to see
the virtual machines’ protection status and to recover them with a few simple actions.
Configuring replication for as many as 500 virtual machines through the same management interface that is
used for all VMware vCenter™ operations is an easy process of right-clicking a virtual machine and selecting the
destination for its replica.
Part of this process is to select a recovery point objective (RPO), which provides information to
vSphere Replication regarding an age limit for the copy of the virtual machine. The RPO determines how
“stale” the data at the recovery location is allowed to be. If a virtual machine must be recovered, it will be
at worst only as old as its configured RPO. vSphere Replication attempts to replicate data to meet the RPO
at all times, ensuring that the virtual machine data is never older than the defined policy for each virtual
machine configured for replication. In many cases, vSphere Replication has data that is actually newer than
the configured RPO, because it will intelligently move individual replications forward in time to alleviate
forecasted potential bandwidth bottlenecks that it determines based on historical traffic patterns.

Figure 4. Selecting an RPO for Multiple Virtual Machines

TECH N I C AL WH ITE PAPE R / 5
VMware vSphere Replication 5.5 Overview

vSphere Replication performs an initial, full synchronization of the source virtual machine and its replica copy.
If wanted, a seed copy of data can be placed at the destination to reduce the time and bandwidth required for
the initial replication. A seed copy of a virtual machine consists of a clone of the original virtual machine disk file,
which can be placed at the target location via a variety of mechanisms. Seeding is not a necessary process, and
vSphere Replication creates an initial copy at the target location whether or not a seed is present. If a user
provides a seed for replication, the contained data is used to reduce the amount of replication required to initially
synchronize the primary disk and its replica. A seed can be created manually or can be cloned and put into place
by any mechanism the administrator chooses, such as offline copying, FTP, “sneakernet,” or even using an ISO or
a clone of a virtual machine, provided that the disk UUID of the seed is the same as that of the original system
being copied.
After baseline synchronization is complete, vSphere Replication switches to transferring only the blocks of data
that have changed. The vSphere kernel itself tracks unique writes to the disk files of protected virtual machines
and identifies and replicates only those blocks that have experienced unique writes during the configured RPO.
This ensures that a minimal amount of data is sent over the network to the target, and it enables aggressive
RPOs. After unique data has been sent, there is no need that it be sent again. Only changes are replicated, and
those blocks are sent to the target location’s vSphere Replication Appliance.

Protected VMs
VM1
VM1
VM1

vCenter

Replica Location

VR
Appliance

vSphere

VR Agent

VM3

Network
File Copy

vSphere

VR Agent

vCenter

VR
Appliance

Changed
Blocks

vSphere

Storage
VMDK1 VMDK2

Network
File Copy

vSphere

Storage
VMDK1

VMDK2

Figure 5. Data Flow of Replication from vSphere Agent to vSphere Replication Appliance

At the target location, the data is received and checked within the vSphere Replication Appliance. Only fully
consistent data is then written (via Network File Copy) to the redo log at the target cluster’s vSphere hosts; only
when the redo log is complete and all expected data has been received will it thereby be written to disk. This
manner of waiting for a completely consistent block group ensures recoverability of the replica virtual machine
at all times, even if data is lost during transit or a crash occurs at any point during the transfer.
From the perspective of the protected virtual machine, this entire process is completely transparent and requires
no changes to configuration or ongoing management. The replication is nonintrusive, irrespective of the OS
within the virtual machine.

TECH N I C AL WH ITE PAPE R / 6
VMware vSphere Replication 5.5 Overview

Simplicity Without Sacrificing Functionality
vSphere Replication is inherently a lightweight replication protocol. By replicating only changed blocks on an
ongoing basis, network bandwidth can be saved and commit times for data are minimized.
The vSphere Replication framework consists of a vSphere Replication appliance that is paired with a single
vCenter Server system. This appliance provides the management framework for vSphere Replication and also
acts as the target for replicated blocks. Increased scale or the presence of multiple remote sites can lead to the
choice of deploying up to nine additional vSphere Replication server virtual appliances, which are deployed in
exactly the same fashion as the original vSphere Replication appliance. By contrast, however, they function
strictly as a destination target for replication and enable simple scaling and distribution of the replication
framework. They do not participate in the management of vSphere Replication; they exist strictly to enable
various topologies and for traffic separation purposes.
With vSphere Replication 5.5, users can choose to replicate to a number of different locations: to another site
with both a vCenter Server system and a vSphere Replication appliance; to another site with only a vSphere
Replication server, within a datacenter to another location on disk; or to any combination they choose. A user
might even choose to replicate between two remote offices that have only a vSphere Replication server
deployed and do not have a vCenter Server system or a vSphere Replication appliance, as long as they are
managed from a central location that does have those objects. As many as 500 virtual machine replications can
be managed with an individual vSphere Replication appliance instance, irrespective of the topologies chosen.

Protected Site

VR Server

vSphere Client
VR
Appliance

vSphere

Target Site 1

NFC

vCenter Server
VMDK2

Storage

vSphere
VRA

VR Server

vSphere

Target Site 2

NFC
VMDK1 VMDK2

Storage

VMDK2

Storage

Figure 6. Framework for Replication with Multiple Sites and vSphere Replication Servers – One Datacenter Replicating to Two Remote Sites

Within this framework, RPOs for each virtual machine can be defined, ranging from 15 minutes to 24 hours. This
RPO can be changed on demand without interruption, enabling administrators to fine-tune replication based on
dynamic factors such as change rates, bandwidth availability and so on.

TECH N I C AL WH ITE PAPE R / 7
VMware vSphere Replication 5.5 Overview

Multiple Sites – Single vCenter

Site 1

Site 2

Site 3

VR
Appliance

vSphere

VR
Appliance

vSphere

VR
Appliance

vSphere

vCenter
Server

VR
Appliance

Replication
Direction

vSphere
vCenter
Server

Site 4
Main Datacenter – Single vCenter

Sample Replication Topologies
Figure 7. Further Possible Options Include Replicating Between Multiple Remote Sites Managed by Different vCenter Server System Instances

Because the RPO is unique to each virtual machine, more-critical virtual machines can be given a more
aggressive replication target than others. Groups of virtual machines, however, can be selected en masse to
enable large-scale changes. Each disk within a virtual machine can be independently configured to be replicated
or not replicated, offering further opportunity to save bandwidth and time for recovery. For instance, a database
server might consist of multiple disks, one of which is dedicated to a temporary scratch location. This disk is not
required for replication. Likewise, sometimes a swap file or paging file is redirected to a dedicated disk that
might also be excluded from replication to save bandwidth for transient data.

TECH N I C AL WH ITE PAPE R / 8
VMware vSphere Replication 5.5 Overview

Figure 8. Replication Is a Policy of the Virtual Machine

The replicated disks are independent of format, layout and snapshots of the primary copy. For example, a virtual
machine disk file that is thick provisioned on a Fibre Channel SAN at the primary location can be thin provisioned
to local disk for recovery, if so chosen. vSphere Replication eliminates the requirement that replication have
identical storage hardware. Likewise, because the virtual machine replica is “cold booted” when recovery takes
place, there is no need that server hardware be identical if replicating between clusters.

Figure 9. Selecting Properties for Replication of a Virtual Machine, Including Retention of Point-in-Time Instances

At its core, vSphere Replication enables policy-driven protection of systems—because the configuration of an
object’s replication is attached as a property of the virtual machine itself—while also enabling virtual machines
to continue operating without any change, overhead or interruption.
The tracking mechanism that identifies changed blocks of a virtual machine resides above the storage layer,
enabling replication that is fully independent of disk location, disk format, thin- or thick-provisioned disks, and
whether or not snapshots are in use by the virtual machine.

TECH N I C AL WH ITE PAPE R / 9
VMware vSphere Replication 5.5 Overview

Recovering a Virtual Machine
Recovery of a virtual machine can be necessitated for a number of reasons, including testing, impending
outages, and even disaster recovery. vSphere Replication is designed to enable administrators to manually
recover an individual machine with a few clicks in the vSphere Web Client.
It is not the goal of vSphere Replication to provide complex orchestration of disaster recovery in the manner
of vCenter Site Recovery Manager. Instead, vSphere Replication offers replication on a per–virtual machine
basis to enable fine-grained recovery configurations for environments that require them. If wanted, however,
vSphere Replication can act as the replication engine for vCenter Site Recovery Manager, with no extra
configuration or special considerations for setup. vCenter Site Recovery Manager can recognize machines that
are protected with vSphere Replication and can “inherit” their protection.

Figure 10. Recover a Virtual Machine by Right-Clicking Its Replication Status

With vSphere Replication, recovery of a virtual machine can be started easily by one of three methods. After
navigating to replication Status in the vSphere Replication area of the vSphere Web Client, the administrator
first selects the virtual machine to be recovered. A recovery action can be initiated by right-clicking, clicking the
recovery icon, and selecting Recover from the Actions drop-down menu.
The replica cannot be powered on and recovered if the original virtual machine is still reachable and is still
powered on. To continue the recovery process, the primary copy of the virtual machine must be unreachable by
vCenter Server or powered off. The next step is to choose a destination for the virtual machine—a folder to hold
it and a cluster or resource pool in which it will be powered on. A method of recovery can be chosen, including
whether to synchronize the most recent changes, if the protected virtual machine is available. If, however, the
protected system is not available or is in an undesirable state, the user can alternately proceed to recover the
virtual machine using the last good replication and not synchronize the most recent changes.

TECH N I C AL WH ITE PAPE R / 1 0
VMware vSphere Replication 5.5 Overview

Figure 11. Recovery of a Virtual Machine Is Complete

After these items are selected, recovery will begin. This process creates a powered-on copy of the virtual
machine connected to the replica disk, but it does not connect any of the virtual network cards to any port
groups. This can help prevent situations where the same virtual machine might be active on the network in two
locations simultaneously, as well as broadcast collision and routing issues involving duplicates. After the virtual
machine is fully booted, the administrator reviews the recovery and status of the booted replica and simply
attaches the virtual machine to the appropriate networks to complete the recovery.

Retention of Multiple Points in Time
vSphere Replication 5.5 introduced the option to retain historical points in time for recovery. As described earlier
in this document, this policy is selected when replication is configured for a virtual machine.

Figure 12. Select Point-in-Time Retention as a Policy of Replication

TECH N I C AL WH ITE PAPE R / 11
VMware vSphere Replication 5.5 Overview

If a virtual machine has been replicated and historical point-in-time retention was chosen, the administrator
has the ability to revert the virtual machine to one of the earlier replicas. The points in time are represented as
virtual machine snapshots that can be browsed using the VMware vSphere Client™ Snapshot Manager.
The point-in-time snapshots are labeled with the date stamp of the moment at which they were created.
The administrator chooses a snapshot to use and can either revert to that point in time or delete one or
more snapshots.

Figure 13. After Recovering a Virtual Machine with Preserved Points in Time, Use the Snapshot Manager to Revert to an Earlier Point

Recovery of a virtual machine is a simple process that can be accomplished in a safe and reliable fashion with a
few clicks in the GUI.

TECH N I C AL WH ITE PAPE R / 12
VMware vSphere Replication 5.5 Overview

Next Steps
Protect Your Virtual Machines from Loss and Downtime with vSphere Replication
Make vSphere Replication a part of your vSphere 5.5 deployment and improve your virtual machine availability
without introducing risk. Register today for a trial of vSphere and enjoy the benefits of replication of your critical
virtual machines as an integrated part of your IT platform.

Additional Documentation
For more information about vSphere, visit the product pages at
http://www.vmware.com/products/vSphere.
The following links are to online vSphere and vCenter Server documents:
•	Product documentation
•	VMware knowledge base

VMware Contact Information
For additional information or to purchase VMware vSphere 5.1, the VMware global network of solution
providers is ready to assist. If you want to contact VMware directly, you can reach a sales representative at
1-877-4VMWARE (650-475-5000 outside North America) or email sales@vmware.com. When emailing, include
the state, country, and company name from which you are inquiring.

Providing Feedback
VMware appreciates your feedback on the material included in this guide and in particular would be grateful for
any guidance on the following topics:
How useful was the information in this guide?
What other specific topics would you like to see covered?
Please send your feedback to docfeedback@vmware.com, with “vSphere Replication 5.5 Overview” in the
subject line. Thank you for your help in making this guide a valuable resource.

About the Author
Ken Werneburg is a senior technical marketing manager at VMware. He works on business continuity and
disaster recovery solutions in the Cloud and Infrastructure Management group. Ken has been with VMware
since 2006.
•	Follow Ken’s blogs at http://blogs.vmware.com/vsphere/uptime.
•	Follow Ken on Twitter: @vmKen.

TECH N I C AL WH ITE PAPE R / 13
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed
at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies. Item No: VMW-TWP-vSPHR-REP-5.5-OVERVW-USLET-101	
Docsource: OIC-13VM004.04

Contenu connexe

Tendances

VMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes EverythingVMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes EverythingVMUG IT
 
Jasper server ce-install-guide
Jasper server ce-install-guideJasper server ce-install-guide
Jasper server ce-install-guidewoid
 
Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6David Pérez Moriche
 
Configuring Oracle Enterprise Manager Cloud Control 12c for High Availability
Configuring Oracle Enterprise Manager Cloud Control 12c for High AvailabilityConfiguring Oracle Enterprise Manager Cloud Control 12c for High Availability
Configuring Oracle Enterprise Manager Cloud Control 12c for High AvailabilityLeighton Nelson
 
SQL Server High Availability Solutions (Pros & Cons)
SQL Server High Availability Solutions (Pros & Cons)SQL Server High Availability Solutions (Pros & Cons)
SQL Server High Availability Solutions (Pros & Cons)Hamid J. Fard
 
Configuring oracle enterprise manager cloud control 12 c for high availability
Configuring oracle enterprise manager cloud control 12 c for high availabilityConfiguring oracle enterprise manager cloud control 12 c for high availability
Configuring oracle enterprise manager cloud control 12 c for high availabilitySon Hyojin
 
VMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project PresentationVMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project PresentationRabbah Adel Ammar
 
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning 클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning Ji-Woong Choi
 
AIXpert - AIX Security expert
AIXpert - AIX Security expertAIXpert - AIX Security expert
AIXpert - AIX Security expertdlfrench
 
Percona Live 2022 - MySQL Architectures
Percona Live 2022 - MySQL ArchitecturesPercona Live 2022 - MySQL Architectures
Percona Live 2022 - MySQL ArchitecturesFrederic Descamps
 
Giải pháp always on trong sql server 2012
Giải pháp always on trong sql server 2012Giải pháp always on trong sql server 2012
Giải pháp always on trong sql server 2012laonap166
 
MySQL User Group NL - MySQL 8
MySQL User Group NL - MySQL 8MySQL User Group NL - MySQL 8
MySQL User Group NL - MySQL 8Frederic Descamps
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e DesignVMUG IT
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture componentsDavid Pasek
 
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법Ji-Woong Choi
 
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & ClusterMySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & ClusterKenny Gryp
 
Wars of MySQL Cluster ( InnoDB Cluster VS Galera )
Wars of MySQL Cluster ( InnoDB Cluster VS Galera ) Wars of MySQL Cluster ( InnoDB Cluster VS Galera )
Wars of MySQL Cluster ( InnoDB Cluster VS Galera ) Mydbops
 
Release and patching strategy
Release and patching strategyRelease and patching strategy
Release and patching strategyJitendra Singh
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...Maichino Sepede
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopsolarisyougood
 

Tendances (20)

VMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes EverythingVMware - Virtual SAN - IT Changes Everything
VMware - Virtual SAN - IT Changes Everything
 
Jasper server ce-install-guide
Jasper server ce-install-guideJasper server ce-install-guide
Jasper server ce-install-guide
 
Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6
 
Configuring Oracle Enterprise Manager Cloud Control 12c for High Availability
Configuring Oracle Enterprise Manager Cloud Control 12c for High AvailabilityConfiguring Oracle Enterprise Manager Cloud Control 12c for High Availability
Configuring Oracle Enterprise Manager Cloud Control 12c for High Availability
 
SQL Server High Availability Solutions (Pros & Cons)
SQL Server High Availability Solutions (Pros & Cons)SQL Server High Availability Solutions (Pros & Cons)
SQL Server High Availability Solutions (Pros & Cons)
 
Configuring oracle enterprise manager cloud control 12 c for high availability
Configuring oracle enterprise manager cloud control 12 c for high availabilityConfiguring oracle enterprise manager cloud control 12 c for high availability
Configuring oracle enterprise manager cloud control 12 c for high availability
 
VMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project PresentationVMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project Presentation
 
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning 클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning
클라우드 컴퓨팅 기반 기술과 오픈스택(Kvm) 기반 Provisioning
 
AIXpert - AIX Security expert
AIXpert - AIX Security expertAIXpert - AIX Security expert
AIXpert - AIX Security expert
 
Percona Live 2022 - MySQL Architectures
Percona Live 2022 - MySQL ArchitecturesPercona Live 2022 - MySQL Architectures
Percona Live 2022 - MySQL Architectures
 
Giải pháp always on trong sql server 2012
Giải pháp always on trong sql server 2012Giải pháp always on trong sql server 2012
Giải pháp always on trong sql server 2012
 
MySQL User Group NL - MySQL 8
MySQL User Group NL - MySQL 8MySQL User Group NL - MySQL 8
MySQL User Group NL - MySQL 8
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법
[오픈소스컨설팅]Day #1 MySQL 엔진소개, 튜닝, 백업 및 복구, 업그레이드방법
 
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & ClusterMySQL Database Architectures - InnoDB ReplicaSet & Cluster
MySQL Database Architectures - InnoDB ReplicaSet & Cluster
 
Wars of MySQL Cluster ( InnoDB Cluster VS Galera )
Wars of MySQL Cluster ( InnoDB Cluster VS Galera ) Wars of MySQL Cluster ( InnoDB Cluster VS Galera )
Wars of MySQL Cluster ( InnoDB Cluster VS Galera )
 
Release and patching strategy
Release and patching strategyRelease and patching strategy
Release and patching strategy
 
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
VxRail Appliance - Modernize your infrastructure and accelerate IT transforma...
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshop
 

En vedette

VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practicesthephuck
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld
 
Andrew dalman withnarrative
Andrew dalman withnarrativeAndrew dalman withnarrative
Andrew dalman withnarrativeKongfuPanda3
 
Professional etiquette short version
Professional etiquette short versionProfessional etiquette short version
Professional etiquette short versionBobby Khatana
 
AIA home loan application form
AIA home loan application formAIA home loan application form
AIA home loan application formAndrea Loh
 
Kelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupKelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupNanda Reda
 
Training powerpoint mha
Training powerpoint mhaTraining powerpoint mha
Training powerpoint mhaThereseS
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530Firman Indrianto
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippaWork Aholic
 
The eight-parts-of-speech
The eight-parts-of-speechThe eight-parts-of-speech
The eight-parts-of-speechImran Ali
 
Հետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինՀետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինnarineharutyunyan
 
Khairani muslim
Khairani muslimKhairani muslim
Khairani muslimNanda Reda
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhFirman Indrianto
 

En vedette (19)

VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
 
Enchilada recipe
Enchilada recipeEnchilada recipe
Enchilada recipe
 
Andrew dalman withnarrative
Andrew dalman withnarrativeAndrew dalman withnarrative
Andrew dalman withnarrative
 
Personalidad ingles
Personalidad inglesPersonalidad ingles
Personalidad ingles
 
Professional etiquette short version
Professional etiquette short versionProfessional etiquette short version
Professional etiquette short version
 
AIA home loan application form
AIA home loan application formAIA home loan application form
AIA home loan application form
 
Karen
KarenKaren
Karen
 
PKM B.inggris
PKM B.inggrisPKM B.inggris
PKM B.inggris
 
Kelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupKelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidup
 
Training powerpoint mha
Training powerpoint mhaTraining powerpoint mha
Training powerpoint mha
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
 
The eight-parts-of-speech
The eight-parts-of-speechThe eight-parts-of-speech
The eight-parts-of-speech
 
Cv danar
Cv danarCv danar
Cv danar
 
Հետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինՀետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասին
 
Khairani muslim
Khairani muslimKhairani muslim
Khairani muslim
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
 

Similaire à V mware v-sphere-replication-overview

What's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageWhat's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageVMware
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...EMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage EMC
 
consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...Itzik Reich
 
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...EMC
 
V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5ssuser4f1d93
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...EMC
 
Mastering VMware Snapshot
Mastering VMware SnapshotMastering VMware Snapshot
Mastering VMware SnapshotMohammed Raffic
 
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...EMC
 
Why Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationWhy Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationVMware
 
V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609Banking at Ho Chi Minh city
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualizationIBM India Smarter Computing
 
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments   Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments EMC
 
Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]gerdev
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313EMC
 
DDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideDDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideJuniper Networks
 
V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]gerdev
 
V sphere 5-upgrade-best-practices-guide
V sphere 5-upgrade-best-practices-guideV sphere 5-upgrade-best-practices-guide
V sphere 5-upgrade-best-practices-guidegerdev
 

Similaire à V mware v-sphere-replication-overview (20)

What's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageWhat's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - Storage
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
 
consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...
 
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
 
V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
 
Mastering VMware Snapshot
Mastering VMware SnapshotMastering VMware Snapshot
Mastering VMware Snapshot
 
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
 
Why Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationWhy Choose VMware for Server Virtualization
Why Choose VMware for Server Virtualization
 
V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
 
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments   Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
 
Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313
 
Db2 virtualization
Db2 virtualizationDb2 virtualization
Db2 virtualization
 
DDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideDDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation Guide
 
V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]
 
V sphere 5-upgrade-best-practices-guide
V sphere 5-upgrade-best-practices-guideV sphere 5-upgrade-best-practices-guide
V sphere 5-upgrade-best-practices-guide
 

Plus de Firman Indrianto

Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-briefFirman Indrianto
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideFirman Indrianto
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVRFirman Indrianto
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guideFirman Indrianto
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challengeFirman Indrianto
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyFirman Indrianto
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini referenceFirman Indrianto
 

Plus de Firman Indrianto (10)

Tutorial c panel
Tutorial c panelTutorial c panel
Tutorial c panel
 
Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-brief
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguide
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guide
 
Uhf regulations
Uhf regulationsUhf regulations
Uhf regulations
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challenge
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedy
 
Wirelessconnect
WirelessconnectWirelessconnect
Wirelessconnect
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini reference
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

V mware v-sphere-replication-overview

  • 1. VMware vSphere Replication 5.5 Overview ® Simple and Effective Virtual Machine Protection TEC H N I C A L W H ITE PA P E R
  • 2. VMware vSphere Replication 5.5 Overview Table of Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 What Is vSphere Replication? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 How Does It Work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Simplicity Without Sacrificing Functionality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Recovering a Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 . . Retention of Multiple Points in Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Next Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Protect Your Virtual Machines from Loss and Downtime with vSphere Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 . . Additional Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 VMware Contact Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Providing Feedback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 TECH N I C AL WH ITE PAPE R / 2
  • 3. VMware vSphere Replication 5.5 Overview Introduction A fundamental part of protecting IT is ensuring that the services provided by virtual machines are resilient and robust at all levels of the compute stack, from hardware through to the application. VMware vSphere® Replication is a feature of the VMware vSphere platform. It is designed to augment the recovery capabilities of the vSphere platform by providing a built-in ability to continually replicate a running virtual machine to another location. vSphere Replication creates a copy of a virtual machine that can be stored locally within a cluster or at another site, providing a data source for rapidly restoring a virtual machine within minutes. vSphere Replication augments offerings in the vSphere availability protection matrix. It provides a solution that enhances business continuity planning, complementing both backup and full disaster recovery, without introducing the complexity and cost of a complete storage array–based replication configuration. vSphere Replication enables configuring replication on a per–virtual machine basis and significantly rounds out the capabilities of protection offered by vSphere. This paper will help users understand what VMware vSphere Replication is, explain some of the benefits of its features, and provide an overview of how it works to protect virtual machines against failure. What Is vSphere Replication? vSphere Replication is a feature of the VMware vSphere platform. It copies a virtual machine to another location, within or between clusters, and makes that copy available for restoration through the VMware vSphere Web Client or through the orchestration of a full disaster recovery product such as VMware® vCenter™ Site Recovery Manager™. vSphere Replication protects the virtual machine on an ongoing basis. It replicates to the copy only the changes that are made to the virtual machine. This ensures that the virtual machine remains protected and is available for recovery directly from the vSphere Web Client without requiring use of an external tool. vSphere Replication is provided as a no-charge component of all eligible vSphere licenses, ranging from VMware vSphere Essentials Plus Kit to VMware vSphere Enterprise Plus Edition™. As with backups through VMware vSphere Data Protection™, protecting a virtual machine is a critical function of a hypervisor platform for the datacenter. Unified management of vSphere Replication is offered via the next-generation vSphere Web Client. This provides a common and unified screen for all aspects of virtual datacenter management, including many aspects of protection such as replication, backup and restore. Some replication technologies provide mere copies of a virtual machine at a remote site without any consideration for the consistency of the application data within the virtual machine. vSphere Replication can be configured to ensure consistent application data, along with virtual machine data, with one simple click when configuring a virtual machine for replication. TECH N I C AL WH ITE PAPE R / 3
  • 4. VMware vSphere Replication 5.5 Overview Figure 1. Integrated with the vSphere Web Client Automatic integration with Microsoft Volume Shadow Copy Service (VSS) ensures that applications such as Microsoft Exchange Server and Microsoft SQL Server databases are quiescent and consistent when replica data is being generated. A quick call to the virtual machine’s VSS layer flushes any outstanding application writes to ensure that the data that is replicated is static and fully recoverable. Figure 2. Application Consistency via VSS There are no application agents or administration required for this process. Application consistency is inherent to the copies made by vSphere Replication and is achieved through communication with the Microsoft Windows operating system (OS) via the installed VMware Tools™. vSphere Replication also enables administrators to choose retention of historical replications as potential points in time to revert a recovered system. When configuring replication for a virtual machine, administrators simply select whether or not to retain multiple points in time; they then can choose how many historical copies are to be retained and for how many days. They can retain a maximum of 24 points in time and can customize the retention configuration. For example, a user might choose to retain one copy daily for as many as 24 days, 24 copies throughout a day for only one day, or any other selection that their requirements might dictate. TECH N I C AL WH ITE PAPE R / 4
  • 5. VMware vSphere Replication 5.5 Overview How Does It Work? vSphere Replication is a deeply integrated component of the vSphere platform. It is the only true “hypervisor-level” replication engine available today. Changed blocks in the virtual machine disk(s) for a running virtual machine are sent to a secondary location, where they are received by a virtual appliance that writes them to an on-disk redo log. Only when that redo log is complete and all blocks in a given replication are received is that set of data applied to the virtual machine disks for the offline (protection) copy of the virtual machine. VM VM VM VM VM Figure 3. Replicate Virtual Machines’ Changed Blocks vSphere Replication consists of an agent that is a part of the core vSphere 5.5 installation package on each host, along with a set of virtual appliances that are deployed from the management interface. From a conceptual perspective, the agent is responsible for both tracking and sending changed data from a running virtual machine; the remote appliance receives the replication and applies it to the offline disk files for the virtual machine. The vSphere Replication appliance also manages replication, which enables the administrator to see the virtual machines’ protection status and to recover them with a few simple actions. Configuring replication for as many as 500 virtual machines through the same management interface that is used for all VMware vCenter™ operations is an easy process of right-clicking a virtual machine and selecting the destination for its replica. Part of this process is to select a recovery point objective (RPO), which provides information to vSphere Replication regarding an age limit for the copy of the virtual machine. The RPO determines how “stale” the data at the recovery location is allowed to be. If a virtual machine must be recovered, it will be at worst only as old as its configured RPO. vSphere Replication attempts to replicate data to meet the RPO at all times, ensuring that the virtual machine data is never older than the defined policy for each virtual machine configured for replication. In many cases, vSphere Replication has data that is actually newer than the configured RPO, because it will intelligently move individual replications forward in time to alleviate forecasted potential bandwidth bottlenecks that it determines based on historical traffic patterns. Figure 4. Selecting an RPO for Multiple Virtual Machines TECH N I C AL WH ITE PAPE R / 5
  • 6. VMware vSphere Replication 5.5 Overview vSphere Replication performs an initial, full synchronization of the source virtual machine and its replica copy. If wanted, a seed copy of data can be placed at the destination to reduce the time and bandwidth required for the initial replication. A seed copy of a virtual machine consists of a clone of the original virtual machine disk file, which can be placed at the target location via a variety of mechanisms. Seeding is not a necessary process, and vSphere Replication creates an initial copy at the target location whether or not a seed is present. If a user provides a seed for replication, the contained data is used to reduce the amount of replication required to initially synchronize the primary disk and its replica. A seed can be created manually or can be cloned and put into place by any mechanism the administrator chooses, such as offline copying, FTP, “sneakernet,” or even using an ISO or a clone of a virtual machine, provided that the disk UUID of the seed is the same as that of the original system being copied. After baseline synchronization is complete, vSphere Replication switches to transferring only the blocks of data that have changed. The vSphere kernel itself tracks unique writes to the disk files of protected virtual machines and identifies and replicates only those blocks that have experienced unique writes during the configured RPO. This ensures that a minimal amount of data is sent over the network to the target, and it enables aggressive RPOs. After unique data has been sent, there is no need that it be sent again. Only changes are replicated, and those blocks are sent to the target location’s vSphere Replication Appliance. Protected VMs VM1 VM1 VM1 vCenter Replica Location VR Appliance vSphere VR Agent VM3 Network File Copy vSphere VR Agent vCenter VR Appliance Changed Blocks vSphere Storage VMDK1 VMDK2 Network File Copy vSphere Storage VMDK1 VMDK2 Figure 5. Data Flow of Replication from vSphere Agent to vSphere Replication Appliance At the target location, the data is received and checked within the vSphere Replication Appliance. Only fully consistent data is then written (via Network File Copy) to the redo log at the target cluster’s vSphere hosts; only when the redo log is complete and all expected data has been received will it thereby be written to disk. This manner of waiting for a completely consistent block group ensures recoverability of the replica virtual machine at all times, even if data is lost during transit or a crash occurs at any point during the transfer. From the perspective of the protected virtual machine, this entire process is completely transparent and requires no changes to configuration or ongoing management. The replication is nonintrusive, irrespective of the OS within the virtual machine. TECH N I C AL WH ITE PAPE R / 6
  • 7. VMware vSphere Replication 5.5 Overview Simplicity Without Sacrificing Functionality vSphere Replication is inherently a lightweight replication protocol. By replicating only changed blocks on an ongoing basis, network bandwidth can be saved and commit times for data are minimized. The vSphere Replication framework consists of a vSphere Replication appliance that is paired with a single vCenter Server system. This appliance provides the management framework for vSphere Replication and also acts as the target for replicated blocks. Increased scale or the presence of multiple remote sites can lead to the choice of deploying up to nine additional vSphere Replication server virtual appliances, which are deployed in exactly the same fashion as the original vSphere Replication appliance. By contrast, however, they function strictly as a destination target for replication and enable simple scaling and distribution of the replication framework. They do not participate in the management of vSphere Replication; they exist strictly to enable various topologies and for traffic separation purposes. With vSphere Replication 5.5, users can choose to replicate to a number of different locations: to another site with both a vCenter Server system and a vSphere Replication appliance; to another site with only a vSphere Replication server, within a datacenter to another location on disk; or to any combination they choose. A user might even choose to replicate between two remote offices that have only a vSphere Replication server deployed and do not have a vCenter Server system or a vSphere Replication appliance, as long as they are managed from a central location that does have those objects. As many as 500 virtual machine replications can be managed with an individual vSphere Replication appliance instance, irrespective of the topologies chosen. Protected Site VR Server vSphere Client VR Appliance vSphere Target Site 1 NFC vCenter Server VMDK2 Storage vSphere VRA VR Server vSphere Target Site 2 NFC VMDK1 VMDK2 Storage VMDK2 Storage Figure 6. Framework for Replication with Multiple Sites and vSphere Replication Servers – One Datacenter Replicating to Two Remote Sites Within this framework, RPOs for each virtual machine can be defined, ranging from 15 minutes to 24 hours. This RPO can be changed on demand without interruption, enabling administrators to fine-tune replication based on dynamic factors such as change rates, bandwidth availability and so on. TECH N I C AL WH ITE PAPE R / 7
  • 8. VMware vSphere Replication 5.5 Overview Multiple Sites – Single vCenter Site 1 Site 2 Site 3 VR Appliance vSphere VR Appliance vSphere VR Appliance vSphere vCenter Server VR Appliance Replication Direction vSphere vCenter Server Site 4 Main Datacenter – Single vCenter Sample Replication Topologies Figure 7. Further Possible Options Include Replicating Between Multiple Remote Sites Managed by Different vCenter Server System Instances Because the RPO is unique to each virtual machine, more-critical virtual machines can be given a more aggressive replication target than others. Groups of virtual machines, however, can be selected en masse to enable large-scale changes. Each disk within a virtual machine can be independently configured to be replicated or not replicated, offering further opportunity to save bandwidth and time for recovery. For instance, a database server might consist of multiple disks, one of which is dedicated to a temporary scratch location. This disk is not required for replication. Likewise, sometimes a swap file or paging file is redirected to a dedicated disk that might also be excluded from replication to save bandwidth for transient data. TECH N I C AL WH ITE PAPE R / 8
  • 9. VMware vSphere Replication 5.5 Overview Figure 8. Replication Is a Policy of the Virtual Machine The replicated disks are independent of format, layout and snapshots of the primary copy. For example, a virtual machine disk file that is thick provisioned on a Fibre Channel SAN at the primary location can be thin provisioned to local disk for recovery, if so chosen. vSphere Replication eliminates the requirement that replication have identical storage hardware. Likewise, because the virtual machine replica is “cold booted” when recovery takes place, there is no need that server hardware be identical if replicating between clusters. Figure 9. Selecting Properties for Replication of a Virtual Machine, Including Retention of Point-in-Time Instances At its core, vSphere Replication enables policy-driven protection of systems—because the configuration of an object’s replication is attached as a property of the virtual machine itself—while also enabling virtual machines to continue operating without any change, overhead or interruption. The tracking mechanism that identifies changed blocks of a virtual machine resides above the storage layer, enabling replication that is fully independent of disk location, disk format, thin- or thick-provisioned disks, and whether or not snapshots are in use by the virtual machine. TECH N I C AL WH ITE PAPE R / 9
  • 10. VMware vSphere Replication 5.5 Overview Recovering a Virtual Machine Recovery of a virtual machine can be necessitated for a number of reasons, including testing, impending outages, and even disaster recovery. vSphere Replication is designed to enable administrators to manually recover an individual machine with a few clicks in the vSphere Web Client. It is not the goal of vSphere Replication to provide complex orchestration of disaster recovery in the manner of vCenter Site Recovery Manager. Instead, vSphere Replication offers replication on a per–virtual machine basis to enable fine-grained recovery configurations for environments that require them. If wanted, however, vSphere Replication can act as the replication engine for vCenter Site Recovery Manager, with no extra configuration or special considerations for setup. vCenter Site Recovery Manager can recognize machines that are protected with vSphere Replication and can “inherit” their protection. Figure 10. Recover a Virtual Machine by Right-Clicking Its Replication Status With vSphere Replication, recovery of a virtual machine can be started easily by one of three methods. After navigating to replication Status in the vSphere Replication area of the vSphere Web Client, the administrator first selects the virtual machine to be recovered. A recovery action can be initiated by right-clicking, clicking the recovery icon, and selecting Recover from the Actions drop-down menu. The replica cannot be powered on and recovered if the original virtual machine is still reachable and is still powered on. To continue the recovery process, the primary copy of the virtual machine must be unreachable by vCenter Server or powered off. The next step is to choose a destination for the virtual machine—a folder to hold it and a cluster or resource pool in which it will be powered on. A method of recovery can be chosen, including whether to synchronize the most recent changes, if the protected virtual machine is available. If, however, the protected system is not available or is in an undesirable state, the user can alternately proceed to recover the virtual machine using the last good replication and not synchronize the most recent changes. TECH N I C AL WH ITE PAPE R / 1 0
  • 11. VMware vSphere Replication 5.5 Overview Figure 11. Recovery of a Virtual Machine Is Complete After these items are selected, recovery will begin. This process creates a powered-on copy of the virtual machine connected to the replica disk, but it does not connect any of the virtual network cards to any port groups. This can help prevent situations where the same virtual machine might be active on the network in two locations simultaneously, as well as broadcast collision and routing issues involving duplicates. After the virtual machine is fully booted, the administrator reviews the recovery and status of the booted replica and simply attaches the virtual machine to the appropriate networks to complete the recovery. Retention of Multiple Points in Time vSphere Replication 5.5 introduced the option to retain historical points in time for recovery. As described earlier in this document, this policy is selected when replication is configured for a virtual machine. Figure 12. Select Point-in-Time Retention as a Policy of Replication TECH N I C AL WH ITE PAPE R / 11
  • 12. VMware vSphere Replication 5.5 Overview If a virtual machine has been replicated and historical point-in-time retention was chosen, the administrator has the ability to revert the virtual machine to one of the earlier replicas. The points in time are represented as virtual machine snapshots that can be browsed using the VMware vSphere Client™ Snapshot Manager. The point-in-time snapshots are labeled with the date stamp of the moment at which they were created. The administrator chooses a snapshot to use and can either revert to that point in time or delete one or more snapshots. Figure 13. After Recovering a Virtual Machine with Preserved Points in Time, Use the Snapshot Manager to Revert to an Earlier Point Recovery of a virtual machine is a simple process that can be accomplished in a safe and reliable fashion with a few clicks in the GUI. TECH N I C AL WH ITE PAPE R / 12
  • 13. VMware vSphere Replication 5.5 Overview Next Steps Protect Your Virtual Machines from Loss and Downtime with vSphere Replication Make vSphere Replication a part of your vSphere 5.5 deployment and improve your virtual machine availability without introducing risk. Register today for a trial of vSphere and enjoy the benefits of replication of your critical virtual machines as an integrated part of your IT platform. Additional Documentation For more information about vSphere, visit the product pages at http://www.vmware.com/products/vSphere. The following links are to online vSphere and vCenter Server documents: • Product documentation • VMware knowledge base VMware Contact Information For additional information or to purchase VMware vSphere 5.1, the VMware global network of solution providers is ready to assist. If you want to contact VMware directly, you can reach a sales representative at 1-877-4VMWARE (650-475-5000 outside North America) or email sales@vmware.com. When emailing, include the state, country, and company name from which you are inquiring. Providing Feedback VMware appreciates your feedback on the material included in this guide and in particular would be grateful for any guidance on the following topics: How useful was the information in this guide? What other specific topics would you like to see covered? Please send your feedback to docfeedback@vmware.com, with “vSphere Replication 5.5 Overview” in the subject line. Thank you for your help in making this guide a valuable resource. About the Author Ken Werneburg is a senior technical marketing manager at VMware. He works on business continuity and disaster recovery solutions in the Cloud and Infrastructure Management group. Ken has been with VMware since 2006. • Follow Ken’s blogs at http://blogs.vmware.com/vsphere/uptime. • Follow Ken on Twitter: @vmKen. TECH N I C AL WH ITE PAPE R / 13
  • 14. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-TWP-vSPHR-REP-5.5-OVERVW-USLET-101 Docsource: OIC-13VM004.04