SlideShare a Scribd company logo
1 of 100
Download to read offline
Site Recovery Manager Administration
                                     vCenter Site Recovery Manager 5.1




             This document supports the version of each product listed and
             supports all subsequent versions until the document is replaced
             by a new edition. To check for more recent editions of this
             document, see http://www.vmware.com/support/pubs.




                                                            EN-000863-00
Site Recovery Manager Administration




You can find the most up-to-date technical documentation on the VMware Web site at:
http://www.vmware.com/support/
The VMware Web site also provides the latest product updates.
If you have comments about this documentation, submit your feedback to:
docfeedback@vmware.com




Copyright © 2008–2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and
intellectual property laws. VMware products are covered by one or more patents listed at
http://www.vmware.com/go/patents.
VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks
and names mentioned herein may be trademarks of their respective companies.




VMware, Inc.
3401 Hillview Ave.
Palo Alto, CA 94304
www.vmware.com




2                                                                                                                  VMware, Inc.
Contents


          About VMware vCenter Site Recovery Manager Administration 7

     1 SRM Privileges, Roles, and Permissions 9
               How SRM Handles Permissions 10
               Assign Roles and Permissions 10
               SRM Roles Reference 11
                  vSphere Replication Roles Reference 15


     2 Creating SRM Placeholders and Mappings 19
               About Placeholder Virtual Machines 19
               About Inventory Mappings 20
                  Select Inventory Mappings 21
               About Placeholder Datastores 21
                  Configure a Placeholder Datastore 22
               Configure Datastore Mappings for vSphere Replication   22


     3 Replicating Virtual Machines 23
               Configure Replication for a Single Virtual Machine 23
               Configure Replication for Multiple Virtual Machines 24
               Replicate Virtual Machines Using Replication Seeds 25
               Move a Virtual Machine to a New vSphere Replication Server 26


     4 Creating Protection Groups 27
               About Array-Based Protection Groups and Datastore Groups 27
                  How SRM Computes Datastore Groups 28
                  Create Array-Based Protection Groups 29
                  Edit Array-Based Protection Groups 30
               Create vSphere Replication Protection Groups 30
                  Edit vSphere Replication Protection Groups 31
               Apply Inventory Mappings to All Members of a Protection Group   31


     5 Creating, Testing, and Running Recovery Plans 33
               Testing a Recovery Plan 34
                   Test Networks and Datacenter Networks 34
               Performing a Planned Migration or Disaster Recovery By Running a Recovery Plan 34
                   Running a Recovery with Forced Recovery 35
               Differences Between Testing and Running a Recovery Plan 35
               How SRM Interacts with DPM and DRS During Recovery 36
               Create, Test, and Run a Recovery Plan 36
                   Create a Recovery Plan 37
                   Edit a Recovery Plan 37



VMware, Inc.                                                                                       3
Site Recovery Manager Administration




                  Suspend Virtual Machines When a Recovery Plan Runs 38
                  Test a Recovery Plan 38
                  Clean Up After Testing a Recovery Plan 39
                  Run a Recovery Plan 39
               Cancel a Test or Recovery 40
               Delete a Recovery Plan 40


     6 Reprotecting Virtual Machines After a Recovery 41
               How SRM Performs Reprotect 42
               Preconditions for Performing Reprotect 43
               Reprotect Virtual Machines 43
               Reprotect States 43
               Reprotecting MSCS and Fault Tolerant Virtual Machines   44


     7 Restoring the Pre-Recovery Site Configuration By Performing Failback 45
               Perform a Failback      46


     8 Customizing a Recovery Plan 49
               Recovery Plan Steps 49
               Specify the Recovery Priority of a Virtual Machine 50
               Creating Custom Recovery Steps 50
                  Types of Custom Recovery Steps 51
                  How SRM Handles Custom Recovery Steps 52
                  Create Top-Level Command Steps 52
                  Create Top-Level Message Prompt Steps 53
                  Create Command Steps for Individual Virtual Machines 53
                  Create Message Prompt Steps for Individual Virtual Machines 54
                  Guidelines for Writing Command Steps 54
                  Environment Variables for Command Steps 54
               Customize the Recovery of an Individual Virtual Machine 55


     9 Customizing IP Properties for Virtual Machines 57
               Customize IP Properties For an Individual Virtual Machine 58
               Report IP Address Mappings for a Protection Group 58
               Customizing IP Properties for Multiple Virtual Machines 59
                  Customize IP Properties for Multiple Virtual Machines 60
                  DR IP Customizer Reference 60


    10 Advanced SRM Configuration 65
               Configure Protection for a Virtual Machine or Template 65
               Configure Resource Mappings for a Virtual Machine 66
               Specify a Nonreplicated Datastore for Swap Files 66
               Recovering Virtual Machines Across Multiple Hosts on the Recovery Site 67
               Resize Virtual Machine Disk Files During Replication Using Replication Seeds 67
               Resize Virtual Machine Disk Files During Replication Without Using Replication Seeds 68
               Reconfigure SRM Settings 68
                  Change Local Site Settings 68
                  Change Recovery Site Settings 69



4                                                                                                        VMware, Inc.
Contents




                  Change Remote Site Settings 69
                  Change the Timeout for the Creation of Placeholder Virtual Machines 70
                  Change Storage Settings 70
                  Change Storage Provider Settings 71
                  Reconfigure Default Recovery Point Objective (RPO) in Replications 72
                  Modify Settings to Run Large SRM Environments 72


   11 Troubleshooting SRM Administration 75
               Limitations to Protection and Recovery of Virtual Machines 75
               SRM Events and Alarms 77
                  How SRM Monitors Connections Between Sites 77
                  Configure SRM Alarms 78
                  SRM Events Reference 78
               Collecting SRM Log Files 86
                  Collect SRM Log Files Using the vSphere Client 86
                  Collect SRM Log Files Manually 87
               Access the vSphere Replication Logs 89
                  Manually Access the vSphere Replication Logs 90
               Resolve SRM Operational Issues 90
                  SRM Doubles the Number of Backslashes in the Command Line When Running Callouts 90
                  Powering on Many Virtual Machines Simultaneously on the Recovery Site Can Lead to Errors 91
                  LVM.enableResignature=1 Remains Set After a SRM Test Failover 92
                  Adding Virtual Machines to a Protection Group Fails with an Unresolved Devices Error 92
                  Recovery Fails with a Timeout Error During Network Customization for Some Virtual
                      Machines 93
                  Scalability Problems when Replicating Many Virtual Machines with a Short RPO to a Shared
                      VMFS Datastore on ESXi Server 5.0 93
                  Application Quiescing Changes to File System Quiescing During vMotion to an Older Host 94
                  Reconfigure Replication on Virtual Machines with No Datastore Mapping 94
                  Configuring Replication Fails for Virtual Machines with Two Disks on Different Datastores 95


          Index 97




VMware, Inc.                                                                                                     5
Site Recovery Manager Administration




6                                      VMware, Inc.
About VMware vCenter Site Recovery Manager
Administration


          VMware vCenter Site Recovery Manager (SRM) is an extension to VMware vCenter Server that delivers a
          business continuity and disaster recovery solution that helps you plan, test, and run the recovery of
          vCenter Server virtual machines. SRM can discover and manage replicated datastores, and automate migration
          of inventory from one vCenter Server instance to another.


Intended Audience
          This book is intended for SRM administrators who are familiar with vSphere and its replication technologies,
          such as host-based replication and replicated datastores. This solution serves the needs of administrators who
          want to configure protection for their vSphere inventory. It might also be appropriate for users who need to
          add virtual machines to a protected inventory or to verify that an existing inventory is properly configured for
          use with SRM.




VMware, Inc.                                                                                                            7
Site Recovery Manager Administration




8                                      VMware, Inc.
SRM Privileges, Roles, and
Permissions                                                                                                        1
          SRM provides disaster recovery by performing operations for users. These operations involve managing
          objects, such as recovery plans or protection groups, and performing operations, such as replicating or
          powering off virtual machines. SRM uses roles and permissions so that only users with the correct roles and
          permissions can perform operations.

          SRM adds several roles to vCenter Server, each of which includes privileges and permissions to complete
          SRM and vCenter Server tasks. You assign users to a role to permit them to complete tasks in SRM.

          Privilege                      The right to perform an action, for example to create a recovery plan or to
                                         modify a protection group.

          Role                           A collection of privileges. Default roles provide the privileges that certain users
                                         require to perform a set of SRM tasks, for example users who manage
                                         protection groups or perform recoveries. A user can have at most one role on
                                         an object, but roles can be combined if the user belongs to multiple groups that
                                         all have roles on the object.

          Permission                     A role granted to a particular user or user group on a specific object. A user or
                                         user group is also known as a principal. A permission is a combination of a
                                         role, an object, and a principal. For example, a permission is the privilege to
                                         modify a specific protection group.

          For information about the roles that SRM adds to vCenter Server and the privileges that users require to
          complete tasks, see “SRM Roles Reference,” on page 11.
          n    How SRM Handles Permissions on page 10
               SRM determines whether a user has permission to perform an operation when you configure protection
               on a virtual machine, rather than at the time that SRM performs the operation.
          n    Assign Roles and Permissions on page 10
               Permission assignments apply on a per-site basis. After installation, only vCenter Server administrators
               can log in to SRM. To allow other users access, vCenter Server administrators must grant them
               permissions in the SRM interface. You must add corresponding permissions on both sites.
          n    SRM Roles Reference on page 11
               SRM includes a set of roles. Each role includes a set of privileges, which enable users with those roles to
               complete different actions.




VMware, Inc.                                                                                                                 9
Site Recovery Manager Administration




How SRM Handles Permissions
          SRM determines whether a user has permission to perform an operation when you configure protection on a
          virtual machine, rather than at the time that SRM performs the operation.

          After SRM verifies that a user has the appropriate permissions on the target vSphere resources, SRM performs
          operations on behalf of users by using the vSphere administrator role.

          For configuration operations, SRM validates user permissions when the user requests the operation.
          Operations other than configuration operations require two phases of validation.
          1     During configuration, SRM verifies that the user configuring the system has the correct permissions to
                complete the configuration on the vCenter Server object. For example, a user must have permission to
                protect a virtual machine and use resources on a secondary vCenter Server that the recovered virtual
                machine uses.

          2     The user performing the configuration must have the correct permissions to complete the task that they
                are configuring. For example, a user must have permissions to run a recovery plan. SRM then completes
                the task on behalf of the user as a vCenter Server administrator.

          As a result, a user who completes a particular task, such as a recovery, does not necessarily require permissions
          to act on vSphere resources. The role authorizes the action, but the action is performed by SRM acting as an
          administrator. SRM performs the operations by using the administrator credentials that you provide when
          you connect the protected and recovery sites.

          SRM maintains a database of permissions for internal SRM objects that uses a model similar to the one the
          vCenter Server uses. SRM verifies its own SRM privileges even on vCenter Server objects. For example, SRM
          checks for the Resource.Recovery Use permission on the target datastore rather than checking multiple low-
          level permissions, such as Allocate space.


Assign Roles and Permissions
          Permission assignments apply on a per-site basis. After installation, only vCenter Server administrators can
          log in to SRM. To allow other users access, vCenter Server administrators must grant them permissions in the
          SRM interface. You must add corresponding permissions on both sites.

          SRM requires permissions on vCenter Server objects as well as on SRM objects. To configure permissions on
          the remote vCenter Server installation, start another instance of vSphere Client. You can change SRM
          permissions from the same interface on both sites after pairing. SRM augments vCenter Server roles and
          permissions with additional permissions that allow detailed control over SRM specific tasks and operations.
          You can use the SRM Assign Permissions window the same way that you use the Assign Permissions window
          in the vSphere Client.

          Procedure

          1     Click Sites, and select the site for which you want to assign permissions.

          2     Click the Permissions tab.

          3     Right-click anywhere in the panel for either the local or remote sites and select Add Permission.

          4     Select a role from the Assigned Role drop-down menu.

                This menu displays all the roles that SRM and vCenter Server make available. When you select a role,
                hierarchical list displays the privileges for that role.

          5     Select Propagate to Child Objects to apply the selected role to all the child objects of the selected inventory
                object.

          6     Click Add.




10                                                                                                                  VMware, Inc.
Chapter 1 SRM Privileges, Roles, and Permissions




          7    Identify a user or group for the role.

               a   From the Domain drop-down menu, select the domain that contains the user or group.

               b   Enter a name in the Search text box or select a name from the Name list.

               c   Click Add and click OK.

          8    Click OK to add the new permission.

          The list of permissions contains all users and groups that have roles assigned to the selected object and states
          in the hierarchy where those roles are assigned.

          What to do next

          Repeat the procedure to assign roles and permissions to users at the recovery site.


SRM Roles Reference
          SRM includes a set of roles. Each role includes a set of privileges, which enable users with those roles to
          complete different actions.

          Roles can have overlapping sets of privileges and actions. For example, the SRM Administrator role and the
          SRM Protection Groups Administrator have the Create privilege for protection groups. With this privilege,
          the user can complete one aspect of the set of tasks that make up the management of protection groups.

          Assign roles to users on SRM objects consistently on both sites, so that protected and recovery objects have
          identical permissions.

          All users must have at least the System.Read privilege on the root folders of vCenter Server and the SRM root
          nodes on both sites.




VMware, Inc.                                                                                                                  11
Site Recovery Manager Administration




          Table 1-1. SRM Roles
                                                                                                Target Object in vCenter Server
          Role                         Privilege                 Action                         Inventory

          SRM Administrator            Site Recovery             Configure advanced settings.   Virtual machine
                                       Manager.Advanced          Configure connections.         Datastore
                                       Settings.Modify           Configure inventory            vCenter Server folder
                                       Site Recovery             preferences.                   Resource pool
                                       Manager.Array             Configure placeholder          Network
                                       Manager.Configure         datastores.                    SRM service instance
                                       Site Recovery             Configure array managers.
                                       Manager.Diagnostics.Exp                                  SRM folder
                                                                 Manage protection groups.
                                       ort                                                      Protection group
                                                                 Manage recovery plans.
                                       Site Recovery                                            Recovery plan
                                       Manager.Inventory         Protect virtual machines.      Array manager
                                       Preferences.Modify        Edit protection groups.
                                       Site Recovery             Remove protection groups.
                                       Manager.Placeholder
                                       Datastores.Configure
                                       Site Recovery
                                       Manager.Protection
                                       Group.Assign to Plan
                                       Site Recovery
                                       Manager.Protection
                                       Group.Create
                                       Site Recovery
                                       Manager.Protection
                                       Group.Modify
                                       Site Recovery
                                       Manager.Protection
                                       Group.Remove
                                       Site Recovery
                                       Manager.Protection
                                       Group.Remove from Plan
                                       Site Recovery
                                       Manager.Recovery
                                       History .View Deleted
                                       Site Recovery
                                       Manager.Recovery
                                       History .Plans
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Configure
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Configure
                                       commands
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Create
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Modify
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Remove
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Reprotect
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Test




12                                                                                                                      VMware, Inc.
Chapter 1 SRM Privileges, Roles, and Permissions




          Table 1-1. SRM Roles (Continued)
                                                                                           Target Object in vCenter Server
          Role                   Privilege                   Action                        Inventory

                                 Site Recovery
                                 Manager.Remote
                                 Site.Modify
                                 Datastore.Replication.Pro
                                 tect
                                 Datastore.Replication.Un
                                 protect
                                 Resource.Recovery Use
                                 Virtual Machine.
                                 Replication.Protect
                                 Virtual Machine.
                                 Replication.Stop

          SRM Protection         Site Recovery               Manage protection groups.     SRM folder
          Groups Administrator   Manager.Protection          Protect virtual machines.     Protection group
                                 Group.Create
                                 Site Recovery
                                 Manager.Protection
                                 Group.Modify
                                 Site Recovery
                                 Manager.Protection
                                 Group.Remove
                                 Datastore.Replication.Pro
                                 tect
                                 Datastore.Replication.Un
                                 protect
                                 Resource.Recovery Use
                                 Virtual Machine.
                                 Replication.Stop

          SRM Recovery           Site Recovery               Manage recovery.              Protection group
          Administrator          Manager.Protection          Test recovery.                Recovery plan
                                 Group.Remove from plan                                    SRM service instance
                                 Site Recovery
                                 Manager.Recovery
                                 Plan.Modify
                                 Site Recovery
                                 Manager.Recovery
                                 Plan.Test
                                 Site Recovery
                                 Manager.Recovery
                                 Plan.Recovery
                                 Site Recovery
                                 Manager.Recovery
                                 Plan.Reprotect
                                 Site Recovery
                                 Manager.Recovery
                                 Plan.Configure
                                 commands
                                 Site Recovery
                                 Manager.Recovery
                                 History.View deleted
                                 plans




VMware, Inc.                                                                                                                  13
Site Recovery Manager Administration




          Table 1-1. SRM Roles (Continued)
                                                                                                Target Object in vCenter Server
          Role                         Privilege                Action                          Inventory

          SRM Recovery Plans           Site Recovery            Manage recovery plans.          Protection group
          Administrator                Manager.Protection       Add protection groups to        Recovery plan
                                       Group.Assign to plan     recovery plans.                 vCenter Server folder
                                       Site Recovery            Test recovery plans.            Datastore
                                       Manager.Protection       Cancel recovery plan test.      Resource pool
                                       Group.Remove from plan
                                                                Edit virtual machine recovery   Network
                                       Site Recovery            properties.
                                       Manager.Recovery
                                       Plan.Configure
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Commands
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Create
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Modify
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Remove
                                       Site Recovery
                                       Manager.Recovery
                                       Plan.Test
                                       Resource.Recovery Use

          SRM Test                     Site Recovery            Test recovery plans.            Recovery plan
          Administrator                Manager.Recovery         Cancel recovery plans test.
                                       Plan.Modify              Edit virtual machine recovery
                                       Site Recovery            properties.
                                       Manager.Recovery
                                       Plan.Test




14                                                                                                                      VMware, Inc.
Chapter 1 SRM Privileges, Roles, and Permissions




   vSphere Replication Roles Reference
          vSphere Replication includes a set of roles. Each role includes a set of privileges, which enable users with those
          roles to complete different actions.

          Table 1-2. vSphere Replication Roles
                                                                                                Target Object in
          Role                       Privilege                            Action                vCenter Server Inventory

          VRM replication viewer     VRM remote.View VR                   View replications.    vCenter Server root folder with
                                     VRM remote.View VRM                  Cannot change         propagation, at primary site
                                                                          replication           (outgoing replications) and
                                     VRM datastore mapper.View
                                                                          parameters.           secondary site (incoming
                                     Host.Replication.Manage                                    replications).
                                     replication
                                                                                                Alternatively, vCenter Server
                                     Virtual                                                    root folder without propagation
                                     machine .Replication.Monitor                               on both sites and virtual
                                     replication                                                machine without propagation
                                                                                                on the primary site.

          VRM virtual machine        VRM remote.View VR                   View replications.    vCenter Server root folder with
          replication user           VRM remote.View VRM                  Manage                propagation on both sites.
                                     VRM datastore mapper.Manage          datastores.           Alternatively, primary
                                                                          Configure and         vCenter Server root folder
                                     VRM datastore mapper.View
                                                                          unconfigure           without propagation on both
                                     Host.Replication.Manage
                                                                          replications.         sites and virtual machine
                                     replication                                                without propagation on the
                                                                          Manage and
                                     Virtual                                                    primary site.
                                                                          monitor
                                     machine.Replication.Configure
                                                                          replications.
                                     replication
                                                                          Requires a
                                     Virtual
                                                                          corresponding
                                     machine.Replication.Manage
                                                                          user with the
                                     replication
                                                                          vSphere
                                     Virtual                              Replication target
                                     machine.Replication.Monitor          datastore user role
                                     replication                          on the secondary
                                                                          site.




VMware, Inc.                                                                                                                    15
Site Recovery Manager Administration




          Table 1-2. vSphere Replication Roles (Continued)
                                                                                                Target Object in
          Role                         Privilege                             Action             vCenter Server Inventory

          VRM administrator            VRM remote.Manage VR                  Incorporates all   vCenter Server root folder with
                                       VRM remote.View VR                    vSphere            propagation on both sites.
                                                                             Replication        Alternatively, vCenter Server
                                       VRM remote.Manage VRM
                                                                             privileges.        root folder without propagation
                                       VRM remote.View VRM
                                                                                                on both sites, virtual machine
                                       VRM datastore mapper.Manage                              without propagation on the
                                       VRM datastore mapper.View                                primary site, target datastore,
                                       VRM diagnostics .Manage                                  target virtual machine folder
                                       VRM session .Terminate                                   with propagation on the
                                                                                                secondary site, target host or
                                       Datastore.Browse datastore
                                                                                                cluster with propagation on the
                                       Datastore.Low level file operations                      secondary site.
                                       Host.Replication.Manage
                                       replication
                                       Resource.Assign virtual machine to
                                       resource pool
                                       Virtual
                                       machine.Configuration.Add
                                       existing disk
                                       Virtual
                                       machine.Configuration.Add or
                                       remove device
                                       Virtual machine.Interaction.Power
                                       On
                                       Virtual machine.Interaction.Device
                                       connection
                                       Virtual machine.Inventory.Register
                                       Virtual
                                       machine.Replication.Configure
                                       replication
                                       Virtual
                                       machine.Replication.Manage
                                       replication
                                       Virtual
                                       machine.Replication.Monitor
                                       replication

          VRM diagnostics              VRM remote.View VR                    Generate,          vCenter Server root folder on
                                       VRM remote.View VRM                   retrieve, and      both sites.
                                                                             delete log
                                       VRM diagnostics .Manage
                                                                             bundles.




16                                                                                                                  VMware, Inc.
Chapter 1 SRM Privileges, Roles, and Permissions




          Table 1-2. vSphere Replication Roles (Continued)
                                                                                                  Target Object in
          Role                        Privilege                             Action                vCenter Server Inventory

          VRM target datastore user   Datastore.Browse datastore            Configure and         Datastore objects on target site.
                                      Datastore.Low level file operations   reconfigure
                                                                            replications.
                                                                            Used in
                                                                            combination with
                                                                            a corresponding
                                                                            user with the
                                                                            VRM virtual
                                                                            machine
                                                                            replication user
                                                                            role on the
                                                                            primary site.

          VRM virtual machine         Datastore.Browse datastore            Recover virtual       Secondary vCenter Server root
          recovery user               Datastore.Low level file operations   machines.             folder with propagation.
                                      Virtual                                                     Alternatively, secondary
                                      machine.Configuration.Add                                   vCenter Server root folder
                                      existing disk                                               without propagation, target
                                                                                                  datastore, target virtual machine
                                      Virtual
                                                                                                  without propagation, target
                                      machine.Configuration.Add or
                                                                                                  virtual machine folder with
                                      remove device
                                                                                                  propagation, target host or
                                      Virtual machine.Interaction.Power                           cluster with propagation.
                                      On
                                      Virtual machine.Interaction.Device
                                      connection
                                      Virtual machine.Inventory.Register
                                      Resource.Assign virtual machine to
                                      resource pool




VMware, Inc.                                                                                                                      17
Site Recovery Manager Administration




18                                     VMware, Inc.
Creating SRM Placeholders and
Mappings                                                                                                        2
          When you use SRM to configure the protection for virtual machines, you reserve resources on the recovery
          site by creating placeholders. You map the resources of the protected virtual machines to resources on the
          recovery site.
          n    About Placeholder Virtual Machines on page 19
               When you add a virtual machine or template to a protection group, SRM creates a placeholder virtual
               machine at the recovery site.
          n    About Inventory Mappings on page 20
               You must create inventory mappings so that SRM can create placeholder virtual machines.
          n    About Placeholder Datastores on page 21
               For every virtual machine in a protection group, SRM creates a placeholder virtual machine at the
               recovery site. You must identify a datastore on the recovery site in which SRM can store the placeholder
               virtual machines.
          n    Configure Datastore Mappings for vSphere Replication on page 22
               You configure datastore mappings to determine which datastores vSphere Replication uses to store
               replicated virtual machine disks and configuration files at the recovery site.


About Placeholder Virtual Machines
          When you add a virtual machine or template to a protection group, SRM creates a placeholder virtual machine
          at the recovery site.

          SRM reserves a place for protected virtual machines in the inventory of the recovery site by creating a subset
          of virtual machine files. SRM uses that subset of files as a placeholder to register a virtual machine with
          vCenter Server on the recovery site. The presence of placeholder in the recovery site inventory provides a
          visual indication to SRM administrators that the virtual machines are protected. The placeholders also indicate
          to vCenter Server administrators that the virtual machines can power on and start consuming local resources
          when SRM tests or runs a recovery plan.

          When you recover a protected virtual machine by testing or running a recovery plan, SRM replaces its
          placeholder with the recovered virtual machine and powers it on according to the settings of the recovery plan.
          After a recovery plan test finishes, SRM restores the placeholders and powers off the virtual machines as part
          of the cleanup process.




VMware, Inc.                                                                                                          19
Site Recovery Manager Administration




     About Placeholder Virtual Machine Templates
          When you protect a template on the protected site, SRM creates the placeholder template by creating a virtual
          machine in the default resource pool of a compute resource and then by marking that virtual machine as a
          template. SRM selects the compute resource from the set of available compute resources in the datacenter on
          the recovery site to which the folder of the virtual machine on the protected site is mapped. All the hosts in
          the selected compute resource must have access to at least one placeholder datastore. At least one host in the
          compute resource must support the hardware version of the protected virtual machine template.


About Inventory Mappings
          You must create inventory mappings so that SRM can create placeholder virtual machines.

          Inventory mappings provide a convenient way to specify how SRM maps virtual machine resources at the
          protected site to resources at the recovery site. SRM applies these mappings to all members of a protection
          group when you create the group. You can reapply mappings whenever necessary, for example when you add
          new members to a group.

          SRM does not enforce an inventory mapping requirement. If you create a protection group without defining
          inventory mappings, you must configure each protected virtual machine individually or use the Configure All
          option. SRM cannot protect a virtual machine unless it has valid inventory mappings for key virtual machine
          resources.
          n     Networks
          n     Folders
          n     Compute resources
          n     Placeholder datastores

          After you configure mappings at the protected site when you configure protection, configure inventory
          mappings at the recovery site to enable reprotect.

          When SRM creates a placeholder virtual machine, SRM derives its folder and compute resource assignments
          from inventory mappings that you establish at the protected site. A vCenter Server administrator at the
          recovery site can modify folder and compute resource assignments as necessary.


     Configuring Inventory Mappings for Individual Virtual Machines
          You can configure mappings for individual virtual machines in a protection group. If you create inventory
          mappings for a site, you can override them by configuring the protection of individual virtual machines. If
          you must override inventory mappings for some members of a protection group, use the vSphere Client to
          connect to the recovery site, and edit the settings of the placeholder virtual machines or move them to a different
          folder or resource pool.


     Changing Inventory Mappings
          If you change existing inventory mappings for a site, the changes do not affect virtual machines that SRM
          already protects. SRM only applies the new mappings to newly added virtual machines or if you repair a lost
          placeholder for a particular virtual machine.

          Because placeholder virtual machines do not support NICs, you cannot change the network configurations of
          placeholder virtual machines. You can only change the network for a placeholder virtual machine in the
          inventory mappings. If no mapping for a network exists, you can specify a network when you configure
          protection for an individual virtual machine. Changes that you make to the placeholder virtual machine
          override the settings that you establish when you configure the protection of the virtual machine. SRM
          preserves these changes at the recovery site during the test and recovery.




20                                                                                                                VMware, Inc.
Chapter 2 Creating SRM Placeholders and Mappings




   How SRM Applies Mappings During Reprotect
          During reprotect, SRM converts the virtual machines from the original protected site into placeholders, to
          protect the recovered virtual machines that were formerly the placeholder virtual machines on the recovery
          site. In most cases, the previously protected virtual machines and their devices are used during reprotect. If
          you add devices to a virtual machine after the virtual machine is recovered, or if original protected virtual
          machines are deleted, SRM uses mappings during reprotect.


   Select Inventory Mappings
          Inventory mappings provide default locations and networks for virtual machines to use when SRM creates
          placeholder virtual machines on the recovery site.

          Unless you intend to configure mappings individually for each member of a protection group, you should
          configure inventory mappings for a site before you create protection groups.

          Procedure

          1    Click Sites in the left pane and select the site for which to configure inventory mappings.

          2    Select a tab for a type of inventory object to configure.

               You can choose between the Resource Mappings tab, Folder Mappings tab, and Network Mappings tab.

          3    Select an inventory object and click Configure Mapping.

          4    Expand the inventory items and navigate to the network, folder, or resource pool on the recovery site to
               which to map the protected site resource.

          5    (Optional) Select how to create the mapping:
               n   Select an existing resource from the list.
               n   Click New Folder or New Resource Pool to create a folder or resource pool on the recovery site to
                   which to map.

               The selected resource appears in the Recovery Site Resources column, and its path relative to the root of
               the vCenter Server on the recovery site appears in the Recovery Site Path column.

          6    Repeat Step 2 through Step 4 for any resource types for which to establish mappings.


About Placeholder Datastores
          For every virtual machine in a protection group, SRM creates a placeholder virtual machine at the recovery
          site. You must identify a datastore on the recovery site in which SRM can store the placeholder virtual machines.

          After you select the datastore to contain the placeholder virtual machines, SRM reserves a place for protected
          virtual machines in the inventory on the recovery site. SRM creates a set of virtual machine files on the specified
          datastore at the recovery site and uses that subset to register the placeholder virtual machine with
          vCenter Server on the recovery site.

          When using array-based replication, to enable planned migration and reprotect, you must select placeholder
          datastores at both sites.

          Placeholder datastores must meet certain criteria.
          n    For clusters, the placeholder datastores must be visible to all of the hosts in the cluster.
          n    You cannot replicate placeholder datastores.




VMware, Inc.                                                                                                                  21
Site Recovery Manager Administration




     Configure a Placeholder Datastore
          You can specify a placeholder datastore for SRM to use for the storage of placeholder virtual machines.

          Prerequisites

          Verify that you connected and paired the protected and recovery sites.

          Procedure

          1     Select Sites in the left pane, and select a site
          2     Click the Placeholder Datastores tab.

          3     Click Configure Placeholder Datastore.

          4     Expand the folders to find a datastore to designate as the location for placeholder virtual machines, click
                the datastore, and click OK.

                NOTE If an array manager is replicating datastores, but the array manager is not configured with SRM,
                the option to select the replicated datastore might be available. Do not select replicated datastores.
                Previously configured and replicated datastores appear but you cannot select them.

                The selected placeholder datastore appears in the Datastore column. If the datastore is on a standalone
                host, the host name appears. If the datastore is on a host that is in a cluster, the cluster name appears.


Configure Datastore Mappings for vSphere Replication
          You configure datastore mappings to determine which datastores vSphere Replication uses to store replicated
          virtual machine disks and configuration files at the recovery site.

          You can use datastore mappings when you configure vSphere Replication for virtual machines as a way to
          select the default destination datastores.

          You configure datastore mappings from the source datastores of the virtual machines being configured for
          replication to destination datastores for the replicated files. A source datastore can be a single datastore that
          contains a single virtual machine, or it can be many datastores with many virtual machines with files spread
          across the datastores.

          When you configure replication for a single virtual machine, you can override the datastore mappings for a
          site, but when you configure replication for multiple virtual machines, you can use only the site-wide datastore
          mappings, and you cannot override them.

          Procedure

          1     Click vSphere Replication in the left pane, and select a site.

          2     Click the Datastore Mappings tab, and select a source datastore.

          3     Click Configure Mapping.

          4     Browse through the hierarchy of datastores at the recovery site and select a datastore to which to map.




22                                                                                                               VMware, Inc.
Replicating Virtual Machines                                                                                       3
          Before you create protection groups, you must configure replication on the virtual machines to protect.
          You can replicate virtual machines by using either array-based replication, vSphere Replication, or a
          combination of both.

          This information concerns replication using vSphere Replication. To configure array-based replication on
          virtual machines, consult the documentation from your storage array manager (SRA) vendor.

          This chapter includes the following topics:
          n    “Configure Replication for a Single Virtual Machine,” on page 23
          n    “Configure Replication for Multiple Virtual Machines,” on page 24
          n    “Replicate Virtual Machines Using Replication Seeds,” on page 25
          n    “Move a Virtual Machine to a New vSphere Replication Server,” on page 26


Configure Replication for a Single Virtual Machine
          vSphere Replication can protect individual virtual machines and their virtual disks by replicating them to
          another location.

          When you configure replication, you set a recovery point objective (RPO) to determine the period of time
          between replications. For example, an RPO of 1 hour seeks to ensure that a virtual machine loses no more than
          1 hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network
          bandwidth is consumed keeping the replica up to date.

          Every time that a virtual machine reaches its RPO target, vSphere Replication records approximately 3800
          bytes of data in the vCenter Server events database. If you set a low RPO period, this can quickly create a large
          volume of data in the database. To avoid creating large volumes of data in the vCenter Server events database,
          limit the number of days that vCenter Server retains event data. See Configure Database Retention Policy in
          the vCenter Server and Host Management Guide. Alternatively, set a higher RPO value.

          The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume
          Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows Server
          2003, XP, or newer. vSphere Replication does not support quiescing for Linux and older versions of Windows
          such as Windows 2000, so this option is unavailable for those operating systems. vSphere Replication supports
          file-system level quiescing for Windows 7 and Windows 2008 and application-level quiescing for Windows
          Server 2008 and Windows Server 8 operating systems.

          You configure replication by selecting all or a subset of the virtual machine's disks. You specify the target
          location for your virtual machine. You can either replicate the whole virtual disk initially, or use the existing
          disk as a replication seed to limit the replication to just the parts of the disk that have changed since the last
          replication.




VMware, Inc.                                                                                                              23
Site Recovery Manager Administration




          Prerequisites

          Verify that you have deployed and connected vSphere Replication appliances and SRM Server instances at
          each site.

          Procedure

          1     On the vSphere Client Home page, click VMs and Templates.

          2     Browse the inventory to find the single virtual machine to replicate using vSphere Replication.

          3     Right-click the virtual machine and click vSphere Replication.
          4     Use the RPO slider or enter a value to configure the maximum amount of data that can be lost in the case
                of a site failure.

                The available range is from 15 minutes to 24 hours.

          5     Select a Guest OS Quiescing configuration, if applicable to the source virtual machine operating system.

          6     If no target file location is specified or to override the default determined by the datastore mappings, click
                Browse to select a target location for the virtual machine.

                Option                                 Description
                Place virtual machine in a datastore   Select a datastore and click OK.
                directly
                Place virtual machine in a specific    Select Specify datastore folder, click Browse to locate the folder, then
                folder in a datastore                  double-click the desired folder.


          7     Select a replication destination for each media device for the virtual machine.

                The next pages are created dynamically depending on the media devices installed on the virtual machine.
                They might include multiple virtual drives, all of which you can configure individually. Configurable
                settings include whether the virtual drive is replicated, the virtual drive's replication destination, and
                information about how the replicated virtual drive is configured. If the disk is to be replicated, select a
                replication destination for the disk before proceeding.

          8     Accept the automatic assignment of a vSphere Replication server or select a particular server on the target
                site.

          9     Review the settings and click Finish to establish replication.


Configure Replication for Multiple Virtual Machines
          vSphere Replication can replicate multiple virtual machines.

          When you configure replication, you set a recovery point objective (RPO) to determine the period of time
          between replications. For example, an RPO of 1 hour seeks to ensure that a virtual machine loses no more than
          1 hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network
          bandwidth is consumed keeping the replica up to date.

          Every time that a virtual machine reaches its RPO target, vSphere Replication records approximately 3800
          bytes of data in the vCenter Server events database. If you set a low RPO period, this can quickly create a large
          volume of data in the database. To avoid creating large volumes of data in the vCenter Server events database,
          limit the number of days that vCenter Server retains event data. See Configure Database Retention Policy in
          the vCenter Server and Host Management Guide. Alternatively, set a higher RPO value.




24                                                                                                                      VMware, Inc.
Chapter 3 Replicating Virtual Machines




          The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume
          Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows Server
          2003, XP, or newer. vSphere Replication does not support quiescing for Linux and older versions of Windows
          such as Windows 2000, so this option is unavailable for those operating systems. vSphere Replication supports
          file-system level quiescing for Windows 7 and Windows 2008 and application-level quiescing for Windows
          Server 2008 and Windows Server 8 operating systems.

          Prerequisites

          To replicate virtual machines using vSphere Replication, you must deploy the vSphere Replication appliance
          at the primary and secondary sites. You must power on the virtual machines to begin replication.
          Before you replicate multiple machines, configure datastore mappings in the SRM user interface. You configure
          the mappings so that information is available to SRM regarding the target datastore destinations for replication.

          Procedure

          1    On the vSphere Web Client Home page, click VMs and Templates.

          2    Select a folder or datacenter in the left pane and click the Virtual Machines tab.

          3    Select the virtual machines to replicate using the Ctrl or Shift keys.

          4    Right-click the virtual machines and click vSphere Replication.

          5    Use the RPO slider or enter a value to configure the maximum amount of data that can be lost in the case
               of a site failure.

               The available range is from 15 minutes to 24 hours.

          6    Select a Guest OS Quiescing configuration, if applicable to the source virtual machine operating system.

          7    (Optional) Choose whether to enable Initial copies of .vmdk files have been placed on the target
               datastore.

               Select this option if you have physically copied VMDK files to the target site for use as replication seeds.
               SRM uses datastore mappings and source virtual machine information to find and use initial copies.
               SRM shows progress and status as it searches for initial copies. You can stop the search process or start it
               again.

          8    Accept the automatic assignment of a vSphere Replication server or select a particular server on the target
               site.

          9    Review the settings and click Finish to establish replication.

          10   Select the vSphere Replication view in the SRM interface.

          11   Select the remote vSphere Replication site and click the Virtual Machines tab.

               If you have configured the datastore mappings for vSphere Replication, the virtual machines synchronize
               with the target site.

          What to do next

          If you did not configure the datastore mappings for vSphere Replication before configuring replication, the
          virtual machines appear in red with the status Datastore mappings were not configured. Reconfigure
          vSphere Replication on the virtual machines manually.


Replicate Virtual Machines Using Replication Seeds
          You can make the initial replication of VDMK files more efficient by physically moving files onto a storage
          device. vSphere Replication uses the physically moved files as replication seeds.

          You might need to use replication seeds if it is not practical to copy the files over the network because the
          amount of data is too large, the bandwidth available is too small, or some combination of the two.



VMware, Inc.                                                                                                                  25
Site Recovery Manager Administration




          When replicating virtual machines, ensure that virtual machines are replicated to subdirectories in datastores.
          Copied disks work if the transfer method preserves the identity information stored in the VMDK file.

          Prerequisites

          To replicate a virtual machine using vSphere Replication, you must establish the vSphere Replication
          infrastructure at both sites. The SRM Server instances at each site must be paired, and the
          vSphere Replication appliances must be paired. If a virtual machine is powered off, replication begins when
          the virtual machine is powered on.

          Procedure

          1     Use the vSphere Client to connect to a vCenter Server that can manage the virtual machines to be physically
                moved.

          2     Click Datastores.

          3     In the left pane, browse to the datastore that contains the files for the virtual machine, select the datastore,
                and in the right pane, click Browse this datastore.

          4     Select the folders for all virtual machines to be physically moved, right-click the selection, and click
                Download.

          5     Select a destination to which to copy the files and click OK.

          6     Click Yes.

          7     After the download finishes, transfer the files to a location on the paired site to upload them.

          8     On the vSphere Client Home page at the paired site, click Datastores.

          9     In the left pane, browse to the datastore to contain the files for the virtual machine, select the datastore,
                and in the right pane, click Browse this datastore.

          10    Select the folder to contain the copies of the virtual machines, right-click the selection, and click Upload
                Folder.

          11    Select the folder containing the virtual machines, and click OK.


Move a Virtual Machine to a New vSphere Replication Server
          After establishing vSphere Replication, you can move the virtual machines that you replicate to other
          vSphere Replication servers. You might do this to complete maintenance tasks on existing servers or to balance
          the load on the servers if one server becomes overloaded with virtual machines.

          Procedure

          1     Select the vSphere Replication view of the SRM client.

          2     Select a vSphere Replication server and click the Virtual Machines tab.

          3     Right-click a virtual machine on which you have configured replication and select Move to.

          4     Select a vSphere Replication server and click Next.

          5     Review the information about the planned move, and click Finish.




26                                                                                                                  VMware, Inc.
Creating Protection Groups                                                                                           4
          After you configure a replication solution, you can create protection groups. A protection group is a collection
          of virtual machines and templates that you protect together by using SRM.

          You include one or more protection groups in each recovery plan. A recovery plan specifies how SRM recovers
          the virtual machines in the protection groups that it contains.

          You must configure the virtual machines in a protection group so that SRM can add them to the
          vCenter Server inventory at the recovery site.

          You configure virtual machines and create protection groups differently depending on whether you use array-
          based replication or vSphere Replication. You cannot create protection groups that combine virtual machines
          for which you configured array-based replication with virtual machines for which you configured
          vSphere Replication. However, you can include array-based protection groups and vSphere Replication
          protection groups in the same recovery plan.
          n    About Array-Based Protection Groups and Datastore Groups on page 27
               When you create a protection group for array-based replication, you specify array information and then
               SRM computes the set of virtual machines into a datastore group. Datastore groups contain all the files
               of the protected virtual machines.
          n    Create vSphere Replication Protection Groups on page 30
               You can create protection groups that contain virtual machines that vSphere Replication protects.
          n    Apply Inventory Mappings to All Members of a Protection Group on page 31
               When you create a protection group for either vSphere Replication or array-based replication, SRM
               applies your inventory mappings to all the virtual machines in the protection group. If you change the
               inventory mappings, add virtual machines to a protected datastore, or if the virtual machines lose their
               protection, you can reapply the mappings to all unconfigured virtual machines in one step.


About Array-Based Protection Groups and Datastore Groups
          When you create a protection group for array-based replication, you specify array information and then
          SRM computes the set of virtual machines into a datastore group. Datastore groups contain all the files of the
          protected virtual machines.

          Protection groups consist of virtual machines that use the same datastore group. A datastore group consists
          of consistency groups. All of the virtual machines and templates in a consistency group replicate their files
          together, and all the virtual machines in the consistency group recover together. You can have a virtual machine
          with files on different datastores. In this case, SRM combines the datastores that contain files for a single virtual
          machine to create a datastore group.




VMware, Inc.                                                                                                                27
Site Recovery Manager Administration




          A datastore group is the smallest unit of storage that SRM can recover or test independently. When you create
          an array-based protection group, it initially contains only those virtual machines that store all of their files on
          one of the datastore groups that SRM associates with the protection group. A protection group can contain one
          or more datastore groups, but a datastore group can belong to only one protection group.

          You can add virtual machines to a protection group by creating them on one of the datastores that belong to
          the datastore groups that SRM associates with the protection group. You can also add virtual machines to the
          protection group by using Storage vMotion to move their storage to one of the datastores in the datastore
          group. You can remove a member from a protection group by moving the virtual machine's files to another
          datastore.
          To configure array-based replication, you must assign each virtual machine to a resource pool, folder, and
          network that exist at the recovery site. You can specify defaults for these assignments by selecting inventory
          mappings. SRM applies inventory mappings when you create the protection group. If you do not specify
          inventory mappings, you must configure them individually for each member of the protection group. SRM
          does not protect virtual machines that you did not configure or that you incorrectly configured for replication,
          even if they reside on a protected datastore.
          n     How SRM Computes Datastore Groups on page 28
                SRM determines the composition of a datastore group by the set of virtual machines that have files on
                the datastores in the group, and by the devices on which those datastores are stored.
          n     Create Array-Based Protection Groups on page 29
                You create array-based protection groups to enable the protection of virtual machines in datastore groups
                that you configure to use array-based replication.
          n     Edit Array-Based Protection Groups on page 30
                You can change the name and description of an array-based protection group and add or remove
                datastore groups that are part of the protection group.


     How SRM Computes Datastore Groups
          SRM determines the composition of a datastore group by the set of virtual machines that have files on the
          datastores in the group, and by the devices on which those datastores are stored.

          When you use array-based replication, each storage array supports a set of replicated devices. On storage area
          network (SAN) arrays that use connection protocols such as Fibre Channel and iSCSI, these devices are called
          logical storage units (LUN) and are composed of one or more physical devices. On network file system (NFS)
          arrays, the replicated devices are typically referred to as volumes. In every pair of replicated storage devices,
          one device is the replication source and the other is the replication target. Data written to the source device is
          replicated to the target device on a schedule controlled by the replication software of the array. When you
          configure SRM to work with an SRA, the replication source is at the protected site and the replication target is
          at the recovery site.

          A datastore provides storage for virtual machine files. By hiding the details of physical storage devices,
          datastores simplify the allocation of storage capacity and provide a uniform model for meeting the storage
          needs of virtual machines. Because any datastore can span multiple devices, SRM must ensure that all devices
          backing the datastore are replicated before it can protect the virtual machines that use that datastore. SRM
          must ensure that all devices containing protected virtual machine files are replicated. During a recovery or
          test, SRM must handle all such devices together.

          To achieve this goal, SRM aggregates datastores into datastore groups to accommodate virtual machines that
          span multiple datastores. SRM regularly checks that datastore groups contain all necessary datastores to
          provide protection for the appropriate virtual machines. When necessary, SRM recalculates datastore groups.
          For example, this can occur when you add new devices to a virtual machine, and you store those devices on a
          datastore that was not previously a part of the datastore group.




28                                                                                                                VMware, Inc.
Chapter 4 Creating Protection Groups




          A datastore group consists of the smallest set of devices required to ensure that if any of a virtual machine's
          files is stored on a device in the group, all of the virtual machine's files are stored on devices that are part of
          the same group. For example, if a virtual machine has disks on two different datastores, then SRM combines
          both datastores into a datastore group. SRM also combines devices into datastore groups according to set
          criteria.
          n    A virtual machine has files on two different datastores.
          n    Two virtual machines share a raw disk mapping (RDM) device on a SAN array, as in the case of a Microsoft
               cluster server (MSCS) cluster.
          n    Two datastores span extents corresponding to different partitions of the same device.
          n    A single datastore spans two extents corresponding to partitions of two different devices.
          n    Multiple devices belong to a consistency group. A consistency group is a collection of replicated devices
               where every state of the target set of devices existed at a specific time as the state of the source set of
               devices. Informally, the devices are replicated together such that when recovery happens using those
               devices, software accessing the targets does not see the data in a state that the software is not prepared to
               deal with.


   Create Array-Based Protection Groups
          You create array-based protection groups to enable the protection of virtual machines in datastore groups that
          you configure to use array-based replication.

          SRM discovered the datastore groups when you configured the array managers. SRM replicates to the recovery
          site each datastore group that you select.

          After you create a protection group, SRM creates placeholder virtual machines and applies inventory mappings
          for each virtual machine in the group. If SRM cannot map a virtual machine to a folder, network, and resource
          pool on the recovery site, SRM sets the virtual machine in the Mapping Missing status, and does not create a
          placeholder for it.

          You can organize protections groups in folders. Different views in the Recovery interface display the names
          of the recovery groups, but they do not display the folder names. If you have two protection groups with the
          same name in different folders, it might be difficult to tell them apart in some views in the Recovery interface.
          Consequently, ensure that protection names are unique across all folders. In environments in which not all
          users have view privileges for all folders, to be sure of the uniqueness of protection group names, do not place
          protection groups in folders.

          When you create protection groups, wait to ensure that the operations finish as expected. Make sure that
          SRM creates the protection group and that the protection of the virtual machines in the group is successful.

          Procedure

          1    Click Protection Groups, and click Create Protection Group.

          2    On the Select a Site and Protection Group Type page, select which site to protect and select Array Based
               Replication.

          3    Select an array pair, and click Next.

          4    Select a datastore group from the list, and click Next.

               When you select a datastore group, the virtual machines in that datastore group appear in the Virtual
               Machines on the Selected Datastore Group pane, and are marked for inclusion in the protection group
               after you create the protection group.

          5    Type a name and optional description for the protection group, and click Next.




VMware, Inc.                                                                                                                   29
Site Recovery Manager Administration




          6     Click Finish to create the protection group and begin the protection of the specified virtual machines.

                You can monitor the progress of the tasks to create the protection group and protect the virtual machines
                in the Recent Tasks panel of the vSphere Client.

          What to do next

          Create a recovery plan with which to associate your protection groups. See “Create a Recovery Plan,” on
          page 37.


     Edit Array-Based Protection Groups
          You can change the name and description of an array-based protection group and add or remove datastore
          groups that are part of the protection group.

          Procedure

          1     Click Protection Groups, right-click an array-based protection group and select Edit Protection Group.

          2     Click Next.

          3     Add or remove datastore groups in the protection group and click Next.

          4     Edit the name or description of the protection group and click Next.

          5     Click Finish.


Create vSphere Replication Protection Groups
          You can create protection groups that contain virtual machines that vSphere Replication protects.

          You can organize protections groups in folders. Different views in the Recovery interface display the names
          of the recovery groups, but they do not display the folder names. If you have two protection groups with the
          same name in different folders, it might be difficult to tell them apart in some views in the Recovery interface.
          Consequently, ensure that protection names are unique across all folders. In environments in which not all
          users have view privileges for all folders, to be sure of the uniqueness of protection group names, do not place
          protection groups in folders.

          When you create a vSphere Replication protection group, you can add to the protection group any virtual
          machines that you configured for vSphere Replication.

          Prerequisites

          Use the vSphere Client to configure vSphere Replication for virtual machines. See “Configure Replication for
          a Single Virtual Machine,” on page 23 or “Configure Replication for Multiple Virtual Machines,” on page 24.

          Procedure

          1     Click Protection Groups and click Create Protection Group.

          2     Select the site to be the protected site, select vSphere Replication, and click Next.

          3     Select virtual machines from the list and click Next.

                Only virtual machines that you configured for vSphere Replication and that are not already in a protection
                group appear in the list.

          4     Type a name and optional description for the protection group, and click Next.

          5     Click Finish to create the protection group.

          What to do next

          Create a recovery plan with which to associate your protection groups. See “Create a Recovery Plan,” on
          page 37.



30                                                                                                              VMware, Inc.
Chapter 4 Creating Protection Groups




   Edit vSphere Replication Protection Groups
          You can edit a vSphere Replication protection group to change its name and to add virtual machines to the
          group.

          Procedure

          1    Click Protection Groups in the left pane and right-click a protection group.

          2    Select Edit Protection Group and click Next.
               You cannot change the Protected Site or Protection Group Type settings.

          3    Add virtual machines to the protection group and click Next.

          4    Edit the name or description of the protection group and click Next.

          5    Click Finish.


Apply Inventory Mappings to All Members of a Protection Group
          When you create a protection group for either vSphere Replication or array-based replication, SRM applies
          your inventory mappings to all the virtual machines in the protection group. If you change the inventory
          mappings, add virtual machines to a protected datastore, or if the virtual machines lose their protection, you
          can reapply the mappings to all unconfigured virtual machines in one step.

          Procedure

          1    Click Protection Groups in the left pane, select a protection group, and click the Virtual Machines tab.

          2    Click Configure All.




VMware, Inc.                                                                                                               31
Site Recovery Manager Administration




32                                     VMware, Inc.
Creating, Testing, and Running
Recovery Plans                                                                                                      5
          After you configure SRM at the protected and recovery sites, you can create, test, and run a recovery plan.
          A recovery plan is like an automated run book. It controls every step of the recovery process, including the
          order in which SRM powers on and powers off virtual machines, the network addresses that recovered virtual
          machines use, and so on. Recovery plans are flexible and customizable.

          A recovery plan includes one or more protection groups. You can include a protection group in more than one
          recovery plan. For example, you can create one recovery plan to handle a planned migration of services from
          the protected site to the recovery site, and another plan to handle an unplanned event such as a power failure
          or natural disaster. Having these different recovery plans allows you to decide how to perform recovery.

          Testing a recovery plan runs the plan without affecting services at the protected or recovery sites, apart from
          powering off any virtual machines on the recovery site if you configure the recovery plan to do so. You can
          perform planned migrations from the protected site to the recovery site or disaster recoveries by running a
          recovery plan.

          You can run only one recovery plan at a time to recover a particular protection group. If you simultaneously
          test or run multiple recovery plans that specify the same protection group, only one recovery plan can fail over
          the protection group. Other running recovery plans that specify the same protection group report warnings
          for that protection group and the virtual machines it contains. The warnings explain that the virtual machines
          were recovered, but do not report other protection groups that the other recovery plans cover.
          n    Testing a Recovery Plan on page 34
               When you create or modify a recovery plan, test it before you try to use it for planned migration or for
               disaster recovery.
          n    Performing a Planned Migration or Disaster Recovery By Running a Recovery Plan on page 34
               You can run a recovery plan under planned circumstances to migrate virtual machines from the protected
               site to the recovery site. You can also run a recovery plan under unplanned circumstances if the protected
               site suffers an unforeseen event that might result in data loss.
          n    Differences Between Testing and Running a Recovery Plan on page 35
               Testing a recovery plan has no lasting effects on either the protected site or the recovery site, but running
               a recovery plan has significant effects on both sites.
          n    How SRM Interacts with DPM and DRS During Recovery on page 36
               Distributed Power Management (DPM) and Distributed Resource Scheduler (DRS) are not mandatory,
               but SRM supports both services and enabling them provides certain benefits when you use SRM.
          n    Create, Test, and Run a Recovery Plan on page 36
               You perform several sets of tasks to create, test, and run a recovery plan.




VMware, Inc.                                                                                                               33
Site Recovery Manager Administration




          n     Cancel a Test or Recovery on page 40
                You can cancel a recovery plan test at any time during its run. You can cancel a planned migration or
                disaster recovery at certain times during its run.
          n     Delete a Recovery Plan on page 40
                You can delete a recovery plan if you do not need it.


Testing a Recovery Plan
          When you create or modify a recovery plan, test it before you try to use it for planned migration or for disaster
          recovery.

          By testing a recovery plan, you ensure that the virtual machines that the plan protects recover correctly to the
          recovery site. If you do not test recovery plans, an actual disaster recovery situation might not recover all virtual
          machines, resulting in data loss.

          Testing a recovery plan exercises nearly every aspect of a recovery plan, although SRM makes several
          concessions to avoid disrupting ongoing operations on the protected and recovery sites. Recovery plans that
          suspend local virtual machines do so for tests as well as for actual recoveries. With this exception, running a
          test recovery does not disrupt replication or ongoing activities at either site.

          You can run test recoveries as often as necessary. You can cancel a recovery plan test at any time.

          Permission to test a recovery plan does not include permission to run a recovery plan. Permission to run a
          recovery plan does not include permission to test a recovery plan. You must assign each permission separately.
          See “Assign Roles and Permissions,” on page 10.


     Test Networks and Datacenter Networks
          When you test a recovery plan, SRM can create a test network that it uses to connect recovered virtual machines.
          Creating a test network allows the test to run without potentially disrupting virtual machines in the production
          environment.

          The test network is managed by its own virtual switch, and in most cases recovered virtual machines can use
          the network without having to change network properties such as IP address, gateway, and so on. You use
          the test network by selecting Auto when you configure the network settings when you run a test.

          A datacenter network is a network that typically supports existing virtual machines at the recovery site. To
          use it, recovered virtual machines must conform to its network address availability rules. These virtual
          machines must use a network address that the network's switch can serve and route, must use the correct
          gateway and DNS host, and so on. Recovered virtual machines that use DHCP can connect to this network
          without additional customization. Other virtual machines require IP customization and additional recovery
          plan steps to apply the customization.

          You must recover any virtual machines that must interact with each other to the same test network. For
          example, if a Web server accesses information on a database, those Web server and database virtual machines
          should recover together to the same network.


Performing a Planned Migration or Disaster Recovery By Running a
Recovery Plan
          You can run a recovery plan under planned circumstances to migrate virtual machines from the protected site
          to the recovery site. You can also run a recovery plan under unplanned circumstances if the protected site
          suffers an unforeseen event that might result in data loss.

          During a planned migration, SRM synchronizes the virtual machines on the recovery site with the virtual
          machines on the protected site, then stops replication. SRM attempts to replicate all virtual machines and
          gracefully shut down the protected machines. If errors occur during a planned migration, the plan stops so
          that you can resolve the errors and rerun the plan. You can reprotect the virtual machines after the recovery.



34                                                                                                                 VMware, Inc.
Chapter 5 Creating, Testing, and Running Recovery Plans




          During disaster recoveries, SRM restores virtual machines on the recovery site to their most recent available
          state, according to the recovery point objective (RPO). When you run a recovery plan to perform a disaster
          recovery, SRM attempts to shut down the virtual machines on the protected site. If SRM cannot shut down the
          virtual machines, SRM still starts the copies at the recovery site, and automatic reprotect might not be possible.

          If SRM detects that a datastore on the protected site is in the all paths down (APD) state and is preventing a
          virtual machine from shutting down, SRM waits for a period before attempting to shut down the virtual
          machine again. The APD state is usually transient, so by waiting for a datastore in the APD state to come back
          online, SRM can gracefully shut down the protected virtual machines on that datastore.

          After SRM completes the final replication, SRM makes changes at both sites that require significant time and
          effort to reverse. Because of this time and effort, you must assign the privilege to test a recovery plan and the
          privilege to run a recovery plan separately.


   Running a Recovery with Forced Recovery
          If the protected site is offline and SRM cannot perform its usual tasks, you can run the recovery with the forced
          recovery option.

          Forced recovery is for use in cases where storage arrays fail at the protected site and, as a result, protected
          virtual machines are unmanageable and cannot be shut down, powered off, or unregistered. In such a case,
          the system state cannot be changed for extended periods. To resolve this situation, you can force failover.
          Forcing failover does not complete the process of shutting down the virtual machines at the protected site. As
          a result, a split-brain scenario occurs, but the recovery might complete more quickly.

          Running forced recovery with array-based replication can affect the mirroring between the protected and the
          recovery storage arrays. After you run forced recovery, you must check that mirroring is set up correctly
          between the protected array and the recovery array before you can perform further replication operations. If
          mirroring is not set up correctly, you must repair the mirroring by using the storage array software.

          When you enable forced recovery, any outstanding changes on the protection site are not replicated to the
          recovery site before the failover sequence begins. Replication of the changes occurs according to the recovery
          point objective (RPO) period of the storage array. If a new virtual machine or template is added on the
          protection site and failover is initiated before the storage RPO period has elapsed, the new virtual machine or
          template does not appear on the replicated datastore and is lost. To avoid losing the new virtual machine or
          template, wait until the end of the RPO period before running the recovery plan with forced recovery.

          After the forced recovery completes and you have verified the mirroring of the storage arrays, you can resolve
          the issue that necessitated the forced recovery. After you resolve the underlying issue, run planned migration
          on the recovery plan again, resolve any problems that occur, and rerun the plan until it finishes successfully.
          Running the recovery plan again does not affect the recovered virtual machines at the recovery site.


Differences Between Testing and Running a Recovery Plan
          Testing a recovery plan has no lasting effects on either the protected site or the recovery site, but running a
          recovery plan has significant effects on both sites.

          You need different privileges when testing and running a recovery plan.

          Table 5-1. How Testing a Recovery Plan Differs from Running a Recovery Plan
          Area of Difference                  Test a Recovery Plan                   Run a Recovery Plan

          Required privileges                 Requires Site Recovery                 Requires Site Recovery
                                              Manager.Recovery Plans.Test            Manager.Recovery Plans.Recovery.
                                              permission.

          Effect on virtual machines at       None                                   SRM shuts down virtual machines in
          protected site                                                             reverse priority order.




VMware, Inc.                                                                                                                    35
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1
Srm admin-5-1

More Related Content

What's hot

Xen server 6.1 customer presentation
Xen server 6.1 customer presentationXen server 6.1 customer presentation
Xen server 6.1 customer presentationNuno Alves
 
Vsp 40 Admin Guide
Vsp 40 Admin GuideVsp 40 Admin Guide
Vsp 40 Admin Guideguestbe4c2c3
 
Private cloud server virtualization
Private cloud server virtualization Private cloud server virtualization
Private cloud server virtualization Pierre-Juan Labeyrie
 
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...Principled Technologies
 
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
XenServer, Hyper-V, and ESXi -  Architecture, API, and CodingXenServer, Hyper-V, and ESXi -  Architecture, API, and Coding
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
 
Total cost comparison: VMware vSphere vs. Microsoft Hyper-V
Total cost comparison: VMware vSphere vs. Microsoft Hyper-VTotal cost comparison: VMware vSphere vs. Microsoft Hyper-V
Total cost comparison: VMware vSphere vs. Microsoft Hyper-VPrincipled Technologies
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideVeeam Software
 
Sh pro40 datasheet_se-sbs_2010_05
Sh pro40 datasheet_se-sbs_2010_05Sh pro40 datasheet_se-sbs_2010_05
Sh pro40 datasheet_se-sbs_2010_05hyperlyte3
 
Cloud infrastructure licensing_v2
Cloud infrastructure licensing_v2Cloud infrastructure licensing_v2
Cloud infrastructure licensing_v2mikhail.mikheev
 
[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012Groupe D.FI
 
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...Banking at Ho Chi Minh city
 
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_admin
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_adminWww.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_admin
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_adminVenkata Ramana
 
Installation guide (web sphereapplication server,db2,tivoli directory
Installation guide (web sphereapplication server,db2,tivoli directory Installation guide (web sphereapplication server,db2,tivoli directory
Installation guide (web sphereapplication server,db2,tivoli directory JEAN EROLD JIRAUD
 
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...Principled Technologies
 
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differencesHyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differencesSolarWinds
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Rishi Sharma
 
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical AnalysisVMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical AnalysisCorporate Technologies
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0hypervnu
 

What's hot (20)

Xen server 6.1 customer presentation
Xen server 6.1 customer presentationXen server 6.1 customer presentation
Xen server 6.1 customer presentation
 
Vsp 40 Admin Guide
Vsp 40 Admin GuideVsp 40 Admin Guide
Vsp 40 Admin Guide
 
Private cloud server virtualization
Private cloud server virtualization Private cloud server virtualization
Private cloud server virtualization
 
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...
Cisco UCS B200 M3 Blade Server with VMware: Uncompromised virtual desktop per...
 
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
XenServer, Hyper-V, and ESXi -  Architecture, API, and CodingXenServer, Hyper-V, and ESXi -  Architecture, API, and Coding
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding
 
Total cost comparison: VMware vSphere vs. Microsoft Hyper-V
Total cost comparison: VMware vSphere vs. Microsoft Hyper-VTotal cost comparison: VMware vSphere vs. Microsoft Hyper-V
Total cost comparison: VMware vSphere vs. Microsoft Hyper-V
 
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study GuideThe Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study Guide
 
Sh pro40 datasheet_se-sbs_2010_05
Sh pro40 datasheet_se-sbs_2010_05Sh pro40 datasheet_se-sbs_2010_05
Sh pro40 datasheet_se-sbs_2010_05
 
Cloud infrastructure licensing_v2
Cloud infrastructure licensing_v2Cloud infrastructure licensing_v2
Cloud infrastructure licensing_v2
 
[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012[café techno] Présentation de Backup Exec 2012
[café techno] Présentation de Backup Exec 2012
 
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...
High availability scenarios with ibm tivoli workload scheduler and ibm tivoli...
 
Veerendra_2016_V2
Veerendra_2016_V2Veerendra_2016_V2
Veerendra_2016_V2
 
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_admin
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_adminWww.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_admin
Www.vmware.com support developer_windowstoolkit_wintk10_doc_viwin_admin
 
Installation guide (web sphereapplication server,db2,tivoli directory
Installation guide (web sphereapplication server,db2,tivoli directory Installation guide (web sphereapplication server,db2,tivoli directory
Installation guide (web sphereapplication server,db2,tivoli directory
 
XS Japan 2008 Ganeti English
XS Japan 2008 Ganeti EnglishXS Japan 2008 Ganeti English
XS Japan 2008 Ganeti English
 
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...
Dell PowerEdge R720 with Samsung SSDs and Windows Server 2012: Supporting vir...
 
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differencesHyper v® 2012 vs v sphere™ 5.1 understanding the differences
Hyper v® 2012 vs v sphere™ 5.1 understanding the differences
 
Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]Esx Server 3i Presentation[1]
Esx Server 3i Presentation[1]
 
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical AnalysisVMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
VMware vSphere Vs. Microsoft Hyper-V: A Technical Analysis
 
Cluster aware updating v1.0
Cluster aware updating v1.0Cluster aware updating v1.0
Cluster aware updating v1.0
 

Similar to Srm admin-5-1

srm-install-config-8-6.pdf ok jost ta,naj
srm-install-config-8-6.pdf ok jost ta,najsrm-install-config-8-6.pdf ok jost ta,naj
srm-install-config-8-6.pdf ok jost ta,najhokismen
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0Eric Sloof
 
VMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere ReplicationVMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere ReplicationVMworld
 
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...VMworld
 
Disaster recovery and business continuity plan using VMware Site Recovery Man...
Disaster recovery and business continuity plan using VMware Site Recovery Man...Disaster recovery and business continuity plan using VMware Site Recovery Man...
Disaster recovery and business continuity plan using VMware Site Recovery Man...Mohammed Raffic
 
Disaster recovery and business continuity plan using vmware site recovery man...
Disaster recovery and business continuity plan using vmware site recovery man...Disaster recovery and business continuity plan using vmware site recovery man...
Disaster recovery and business continuity plan using vmware site recovery man...Mohammed Raffic
 
VMware Site Recovery Manager and Compellent
VMware Site Recovery Manager and CompellentVMware Site Recovery Manager and Compellent
VMware Site Recovery Manager and CompellentCompellent Technologies
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualSanjeev Kumar
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld
 
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...VMworld
 
Mythbusting goes virtual What's new in vSphere 5.1
Mythbusting goes virtual   What's new in vSphere 5.1Mythbusting goes virtual   What's new in vSphere 5.1
Mythbusting goes virtual What's new in vSphere 5.1Eric Sloof
 
ESX Server 3i Installable Setup Guide
ESX Server 3i Installable Setup GuideESX Server 3i Installable Setup Guide
ESX Server 3i Installable Setup Guidewebhostingguy
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration1CloudRoad.com
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1faz4eva_27
 
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...thephuck
 

Similar to Srm admin-5-1 (20)

srm-install-config-8-6.pdf ok jost ta,naj
srm-install-config-8-6.pdf ok jost ta,najsrm-install-config-8-6.pdf ok jost ta,naj
srm-install-config-8-6.pdf ok jost ta,naj
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
 
What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0What’s New in VMware vCenter Site Recovery Manager v5.0
What’s New in VMware vCenter Site Recovery Manager v5.0
 
VMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere ReplicationVMworld 2014: Site Recovery Manager and vSphere Replication
VMworld 2014: Site Recovery Manager and vSphere Replication
 
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
VMworld 2013: VMware vCenter Site Recovery Manager – Solution Overview and Le...
 
Disaster recovery and business continuity plan using VMware Site Recovery Man...
Disaster recovery and business continuity plan using VMware Site Recovery Man...Disaster recovery and business continuity plan using VMware Site Recovery Man...
Disaster recovery and business continuity plan using VMware Site Recovery Man...
 
Disaster recovery and business continuity plan using vmware site recovery man...
Disaster recovery and business continuity plan using vmware site recovery man...Disaster recovery and business continuity plan using vmware site recovery man...
Disaster recovery and business continuity plan using vmware site recovery man...
 
VMware Site Recovery Manager and Compellent
VMware Site Recovery Manager and CompellentVMware Site Recovery Manager and Compellent
VMware Site Recovery Manager and Compellent
 
RESUME-Adimulam-Rahul
RESUME-Adimulam-RahulRESUME-Adimulam-Rahul
RESUME-Adimulam-Rahul
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
VMware Site Recovery Manager 6
VMware Site Recovery Manager 6VMware Site Recovery Manager 6
VMware Site Recovery Manager 6
 
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab ManualVMware Site Recovery Manager (SRM) 6.0 Lab Manual
VMware Site Recovery Manager (SRM) 6.0 Lab Manual
 
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
VMworld 2013: VMware vSphere Replication: Technical Walk-Through with Enginee...
 
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
VMworld Europe 2014: A Blueprint for Disaster Recovery of Business Critical A...
 
Mythbusting goes virtual What's new in vSphere 5.1
Mythbusting goes virtual   What's new in vSphere 5.1Mythbusting goes virtual   What's new in vSphere 5.1
Mythbusting goes virtual What's new in vSphere 5.1
 
ESX Server 3i Installable Setup Guide
ESX Server 3i Installable Setup GuideESX Server 3i Installable Setup Guide
ESX Server 3i Installable Setup Guide
 
GAB 2016 ASR
GAB 2016 ASRGAB 2016 ASR
GAB 2016 ASR
 
Dell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and IntegrationDell Compellent: VMware vSphere 5.x and Integration
Dell Compellent: VMware vSphere 5.x and Integration
 
Vmware srm 6.1
Vmware srm 6.1Vmware srm 6.1
Vmware srm 6.1
 
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...
VMworld 2014 - BCO1152 - vCenter Site Recovery Manager: Architecting a DR Sol...
 

Recently uploaded

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 

Recently uploaded (20)

Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 

Srm admin-5-1

  • 1. Site Recovery Manager Administration vCenter Site Recovery Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document, see http://www.vmware.com/support/pubs. EN-000863-00
  • 2. Site Recovery Manager Administration You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product updates. If you have comments about this documentation, submit your feedback to: docfeedback@vmware.com Copyright © 2008–2012 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc. 3401 Hillview Ave. Palo Alto, CA 94304 www.vmware.com 2 VMware, Inc.
  • 3. Contents About VMware vCenter Site Recovery Manager Administration 7 1 SRM Privileges, Roles, and Permissions 9 How SRM Handles Permissions 10 Assign Roles and Permissions 10 SRM Roles Reference 11 vSphere Replication Roles Reference 15 2 Creating SRM Placeholders and Mappings 19 About Placeholder Virtual Machines 19 About Inventory Mappings 20 Select Inventory Mappings 21 About Placeholder Datastores 21 Configure a Placeholder Datastore 22 Configure Datastore Mappings for vSphere Replication 22 3 Replicating Virtual Machines 23 Configure Replication for a Single Virtual Machine 23 Configure Replication for Multiple Virtual Machines 24 Replicate Virtual Machines Using Replication Seeds 25 Move a Virtual Machine to a New vSphere Replication Server 26 4 Creating Protection Groups 27 About Array-Based Protection Groups and Datastore Groups 27 How SRM Computes Datastore Groups 28 Create Array-Based Protection Groups 29 Edit Array-Based Protection Groups 30 Create vSphere Replication Protection Groups 30 Edit vSphere Replication Protection Groups 31 Apply Inventory Mappings to All Members of a Protection Group 31 5 Creating, Testing, and Running Recovery Plans 33 Testing a Recovery Plan 34 Test Networks and Datacenter Networks 34 Performing a Planned Migration or Disaster Recovery By Running a Recovery Plan 34 Running a Recovery with Forced Recovery 35 Differences Between Testing and Running a Recovery Plan 35 How SRM Interacts with DPM and DRS During Recovery 36 Create, Test, and Run a Recovery Plan 36 Create a Recovery Plan 37 Edit a Recovery Plan 37 VMware, Inc. 3
  • 4. Site Recovery Manager Administration Suspend Virtual Machines When a Recovery Plan Runs 38 Test a Recovery Plan 38 Clean Up After Testing a Recovery Plan 39 Run a Recovery Plan 39 Cancel a Test or Recovery 40 Delete a Recovery Plan 40 6 Reprotecting Virtual Machines After a Recovery 41 How SRM Performs Reprotect 42 Preconditions for Performing Reprotect 43 Reprotect Virtual Machines 43 Reprotect States 43 Reprotecting MSCS and Fault Tolerant Virtual Machines 44 7 Restoring the Pre-Recovery Site Configuration By Performing Failback 45 Perform a Failback 46 8 Customizing a Recovery Plan 49 Recovery Plan Steps 49 Specify the Recovery Priority of a Virtual Machine 50 Creating Custom Recovery Steps 50 Types of Custom Recovery Steps 51 How SRM Handles Custom Recovery Steps 52 Create Top-Level Command Steps 52 Create Top-Level Message Prompt Steps 53 Create Command Steps for Individual Virtual Machines 53 Create Message Prompt Steps for Individual Virtual Machines 54 Guidelines for Writing Command Steps 54 Environment Variables for Command Steps 54 Customize the Recovery of an Individual Virtual Machine 55 9 Customizing IP Properties for Virtual Machines 57 Customize IP Properties For an Individual Virtual Machine 58 Report IP Address Mappings for a Protection Group 58 Customizing IP Properties for Multiple Virtual Machines 59 Customize IP Properties for Multiple Virtual Machines 60 DR IP Customizer Reference 60 10 Advanced SRM Configuration 65 Configure Protection for a Virtual Machine or Template 65 Configure Resource Mappings for a Virtual Machine 66 Specify a Nonreplicated Datastore for Swap Files 66 Recovering Virtual Machines Across Multiple Hosts on the Recovery Site 67 Resize Virtual Machine Disk Files During Replication Using Replication Seeds 67 Resize Virtual Machine Disk Files During Replication Without Using Replication Seeds 68 Reconfigure SRM Settings 68 Change Local Site Settings 68 Change Recovery Site Settings 69 4 VMware, Inc.
  • 5. Contents Change Remote Site Settings 69 Change the Timeout for the Creation of Placeholder Virtual Machines 70 Change Storage Settings 70 Change Storage Provider Settings 71 Reconfigure Default Recovery Point Objective (RPO) in Replications 72 Modify Settings to Run Large SRM Environments 72 11 Troubleshooting SRM Administration 75 Limitations to Protection and Recovery of Virtual Machines 75 SRM Events and Alarms 77 How SRM Monitors Connections Between Sites 77 Configure SRM Alarms 78 SRM Events Reference 78 Collecting SRM Log Files 86 Collect SRM Log Files Using the vSphere Client 86 Collect SRM Log Files Manually 87 Access the vSphere Replication Logs 89 Manually Access the vSphere Replication Logs 90 Resolve SRM Operational Issues 90 SRM Doubles the Number of Backslashes in the Command Line When Running Callouts 90 Powering on Many Virtual Machines Simultaneously on the Recovery Site Can Lead to Errors 91 LVM.enableResignature=1 Remains Set After a SRM Test Failover 92 Adding Virtual Machines to a Protection Group Fails with an Unresolved Devices Error 92 Recovery Fails with a Timeout Error During Network Customization for Some Virtual Machines 93 Scalability Problems when Replicating Many Virtual Machines with a Short RPO to a Shared VMFS Datastore on ESXi Server 5.0 93 Application Quiescing Changes to File System Quiescing During vMotion to an Older Host 94 Reconfigure Replication on Virtual Machines with No Datastore Mapping 94 Configuring Replication Fails for Virtual Machines with Two Disks on Different Datastores 95 Index 97 VMware, Inc. 5
  • 6. Site Recovery Manager Administration 6 VMware, Inc.
  • 7. About VMware vCenter Site Recovery Manager Administration VMware vCenter Site Recovery Manager (SRM) is an extension to VMware vCenter Server that delivers a business continuity and disaster recovery solution that helps you plan, test, and run the recovery of vCenter Server virtual machines. SRM can discover and manage replicated datastores, and automate migration of inventory from one vCenter Server instance to another. Intended Audience This book is intended for SRM administrators who are familiar with vSphere and its replication technologies, such as host-based replication and replicated datastores. This solution serves the needs of administrators who want to configure protection for their vSphere inventory. It might also be appropriate for users who need to add virtual machines to a protected inventory or to verify that an existing inventory is properly configured for use with SRM. VMware, Inc. 7
  • 8. Site Recovery Manager Administration 8 VMware, Inc.
  • 9. SRM Privileges, Roles, and Permissions 1 SRM provides disaster recovery by performing operations for users. These operations involve managing objects, such as recovery plans or protection groups, and performing operations, such as replicating or powering off virtual machines. SRM uses roles and permissions so that only users with the correct roles and permissions can perform operations. SRM adds several roles to vCenter Server, each of which includes privileges and permissions to complete SRM and vCenter Server tasks. You assign users to a role to permit them to complete tasks in SRM. Privilege The right to perform an action, for example to create a recovery plan or to modify a protection group. Role A collection of privileges. Default roles provide the privileges that certain users require to perform a set of SRM tasks, for example users who manage protection groups or perform recoveries. A user can have at most one role on an object, but roles can be combined if the user belongs to multiple groups that all have roles on the object. Permission A role granted to a particular user or user group on a specific object. A user or user group is also known as a principal. A permission is a combination of a role, an object, and a principal. For example, a permission is the privilege to modify a specific protection group. For information about the roles that SRM adds to vCenter Server and the privileges that users require to complete tasks, see “SRM Roles Reference,” on page 11. n How SRM Handles Permissions on page 10 SRM determines whether a user has permission to perform an operation when you configure protection on a virtual machine, rather than at the time that SRM performs the operation. n Assign Roles and Permissions on page 10 Permission assignments apply on a per-site basis. After installation, only vCenter Server administrators can log in to SRM. To allow other users access, vCenter Server administrators must grant them permissions in the SRM interface. You must add corresponding permissions on both sites. n SRM Roles Reference on page 11 SRM includes a set of roles. Each role includes a set of privileges, which enable users with those roles to complete different actions. VMware, Inc. 9
  • 10. Site Recovery Manager Administration How SRM Handles Permissions SRM determines whether a user has permission to perform an operation when you configure protection on a virtual machine, rather than at the time that SRM performs the operation. After SRM verifies that a user has the appropriate permissions on the target vSphere resources, SRM performs operations on behalf of users by using the vSphere administrator role. For configuration operations, SRM validates user permissions when the user requests the operation. Operations other than configuration operations require two phases of validation. 1 During configuration, SRM verifies that the user configuring the system has the correct permissions to complete the configuration on the vCenter Server object. For example, a user must have permission to protect a virtual machine and use resources on a secondary vCenter Server that the recovered virtual machine uses. 2 The user performing the configuration must have the correct permissions to complete the task that they are configuring. For example, a user must have permissions to run a recovery plan. SRM then completes the task on behalf of the user as a vCenter Server administrator. As a result, a user who completes a particular task, such as a recovery, does not necessarily require permissions to act on vSphere resources. The role authorizes the action, but the action is performed by SRM acting as an administrator. SRM performs the operations by using the administrator credentials that you provide when you connect the protected and recovery sites. SRM maintains a database of permissions for internal SRM objects that uses a model similar to the one the vCenter Server uses. SRM verifies its own SRM privileges even on vCenter Server objects. For example, SRM checks for the Resource.Recovery Use permission on the target datastore rather than checking multiple low- level permissions, such as Allocate space. Assign Roles and Permissions Permission assignments apply on a per-site basis. After installation, only vCenter Server administrators can log in to SRM. To allow other users access, vCenter Server administrators must grant them permissions in the SRM interface. You must add corresponding permissions on both sites. SRM requires permissions on vCenter Server objects as well as on SRM objects. To configure permissions on the remote vCenter Server installation, start another instance of vSphere Client. You can change SRM permissions from the same interface on both sites after pairing. SRM augments vCenter Server roles and permissions with additional permissions that allow detailed control over SRM specific tasks and operations. You can use the SRM Assign Permissions window the same way that you use the Assign Permissions window in the vSphere Client. Procedure 1 Click Sites, and select the site for which you want to assign permissions. 2 Click the Permissions tab. 3 Right-click anywhere in the panel for either the local or remote sites and select Add Permission. 4 Select a role from the Assigned Role drop-down menu. This menu displays all the roles that SRM and vCenter Server make available. When you select a role, hierarchical list displays the privileges for that role. 5 Select Propagate to Child Objects to apply the selected role to all the child objects of the selected inventory object. 6 Click Add. 10 VMware, Inc.
  • 11. Chapter 1 SRM Privileges, Roles, and Permissions 7 Identify a user or group for the role. a From the Domain drop-down menu, select the domain that contains the user or group. b Enter a name in the Search text box or select a name from the Name list. c Click Add and click OK. 8 Click OK to add the new permission. The list of permissions contains all users and groups that have roles assigned to the selected object and states in the hierarchy where those roles are assigned. What to do next Repeat the procedure to assign roles and permissions to users at the recovery site. SRM Roles Reference SRM includes a set of roles. Each role includes a set of privileges, which enable users with those roles to complete different actions. Roles can have overlapping sets of privileges and actions. For example, the SRM Administrator role and the SRM Protection Groups Administrator have the Create privilege for protection groups. With this privilege, the user can complete one aspect of the set of tasks that make up the management of protection groups. Assign roles to users on SRM objects consistently on both sites, so that protected and recovery objects have identical permissions. All users must have at least the System.Read privilege on the root folders of vCenter Server and the SRM root nodes on both sites. VMware, Inc. 11
  • 12. Site Recovery Manager Administration Table 1-1. SRM Roles Target Object in vCenter Server Role Privilege Action Inventory SRM Administrator Site Recovery Configure advanced settings. Virtual machine Manager.Advanced Configure connections. Datastore Settings.Modify Configure inventory vCenter Server folder Site Recovery preferences. Resource pool Manager.Array Configure placeholder Network Manager.Configure datastores. SRM service instance Site Recovery Configure array managers. Manager.Diagnostics.Exp SRM folder Manage protection groups. ort Protection group Manage recovery plans. Site Recovery Recovery plan Manager.Inventory Protect virtual machines. Array manager Preferences.Modify Edit protection groups. Site Recovery Remove protection groups. Manager.Placeholder Datastores.Configure Site Recovery Manager.Protection Group.Assign to Plan Site Recovery Manager.Protection Group.Create Site Recovery Manager.Protection Group.Modify Site Recovery Manager.Protection Group.Remove Site Recovery Manager.Protection Group.Remove from Plan Site Recovery Manager.Recovery History .View Deleted Site Recovery Manager.Recovery History .Plans Site Recovery Manager.Recovery Plan.Configure Site Recovery Manager.Recovery Plan.Configure commands Site Recovery Manager.Recovery Plan.Create Site Recovery Manager.Recovery Plan.Modify Site Recovery Manager.Recovery Plan.Remove Site Recovery Manager.Recovery Plan.Reprotect Site Recovery Manager.Recovery Plan.Test 12 VMware, Inc.
  • 13. Chapter 1 SRM Privileges, Roles, and Permissions Table 1-1. SRM Roles (Continued) Target Object in vCenter Server Role Privilege Action Inventory Site Recovery Manager.Remote Site.Modify Datastore.Replication.Pro tect Datastore.Replication.Un protect Resource.Recovery Use Virtual Machine. Replication.Protect Virtual Machine. Replication.Stop SRM Protection Site Recovery Manage protection groups. SRM folder Groups Administrator Manager.Protection Protect virtual machines. Protection group Group.Create Site Recovery Manager.Protection Group.Modify Site Recovery Manager.Protection Group.Remove Datastore.Replication.Pro tect Datastore.Replication.Un protect Resource.Recovery Use Virtual Machine. Replication.Stop SRM Recovery Site Recovery Manage recovery. Protection group Administrator Manager.Protection Test recovery. Recovery plan Group.Remove from plan SRM service instance Site Recovery Manager.Recovery Plan.Modify Site Recovery Manager.Recovery Plan.Test Site Recovery Manager.Recovery Plan.Recovery Site Recovery Manager.Recovery Plan.Reprotect Site Recovery Manager.Recovery Plan.Configure commands Site Recovery Manager.Recovery History.View deleted plans VMware, Inc. 13
  • 14. Site Recovery Manager Administration Table 1-1. SRM Roles (Continued) Target Object in vCenter Server Role Privilege Action Inventory SRM Recovery Plans Site Recovery Manage recovery plans. Protection group Administrator Manager.Protection Add protection groups to Recovery plan Group.Assign to plan recovery plans. vCenter Server folder Site Recovery Test recovery plans. Datastore Manager.Protection Cancel recovery plan test. Resource pool Group.Remove from plan Edit virtual machine recovery Network Site Recovery properties. Manager.Recovery Plan.Configure Site Recovery Manager.Recovery Plan.Commands Site Recovery Manager.Recovery Plan.Create Site Recovery Manager.Recovery Plan.Modify Site Recovery Manager.Recovery Plan.Remove Site Recovery Manager.Recovery Plan.Test Resource.Recovery Use SRM Test Site Recovery Test recovery plans. Recovery plan Administrator Manager.Recovery Cancel recovery plans test. Plan.Modify Edit virtual machine recovery Site Recovery properties. Manager.Recovery Plan.Test 14 VMware, Inc.
  • 15. Chapter 1 SRM Privileges, Roles, and Permissions vSphere Replication Roles Reference vSphere Replication includes a set of roles. Each role includes a set of privileges, which enable users with those roles to complete different actions. Table 1-2. vSphere Replication Roles Target Object in Role Privilege Action vCenter Server Inventory VRM replication viewer VRM remote.View VR View replications. vCenter Server root folder with VRM remote.View VRM Cannot change propagation, at primary site replication (outgoing replications) and VRM datastore mapper.View parameters. secondary site (incoming Host.Replication.Manage replications). replication Alternatively, vCenter Server Virtual root folder without propagation machine .Replication.Monitor on both sites and virtual replication machine without propagation on the primary site. VRM virtual machine VRM remote.View VR View replications. vCenter Server root folder with replication user VRM remote.View VRM Manage propagation on both sites. VRM datastore mapper.Manage datastores. Alternatively, primary Configure and vCenter Server root folder VRM datastore mapper.View unconfigure without propagation on both Host.Replication.Manage replications. sites and virtual machine replication without propagation on the Manage and Virtual primary site. monitor machine.Replication.Configure replications. replication Requires a Virtual corresponding machine.Replication.Manage user with the replication vSphere Virtual Replication target machine.Replication.Monitor datastore user role replication on the secondary site. VMware, Inc. 15
  • 16. Site Recovery Manager Administration Table 1-2. vSphere Replication Roles (Continued) Target Object in Role Privilege Action vCenter Server Inventory VRM administrator VRM remote.Manage VR Incorporates all vCenter Server root folder with VRM remote.View VR vSphere propagation on both sites. Replication Alternatively, vCenter Server VRM remote.Manage VRM privileges. root folder without propagation VRM remote.View VRM on both sites, virtual machine VRM datastore mapper.Manage without propagation on the VRM datastore mapper.View primary site, target datastore, VRM diagnostics .Manage target virtual machine folder VRM session .Terminate with propagation on the secondary site, target host or Datastore.Browse datastore cluster with propagation on the Datastore.Low level file operations secondary site. Host.Replication.Manage replication Resource.Assign virtual machine to resource pool Virtual machine.Configuration.Add existing disk Virtual machine.Configuration.Add or remove device Virtual machine.Interaction.Power On Virtual machine.Interaction.Device connection Virtual machine.Inventory.Register Virtual machine.Replication.Configure replication Virtual machine.Replication.Manage replication Virtual machine.Replication.Monitor replication VRM diagnostics VRM remote.View VR Generate, vCenter Server root folder on VRM remote.View VRM retrieve, and both sites. delete log VRM diagnostics .Manage bundles. 16 VMware, Inc.
  • 17. Chapter 1 SRM Privileges, Roles, and Permissions Table 1-2. vSphere Replication Roles (Continued) Target Object in Role Privilege Action vCenter Server Inventory VRM target datastore user Datastore.Browse datastore Configure and Datastore objects on target site. Datastore.Low level file operations reconfigure replications. Used in combination with a corresponding user with the VRM virtual machine replication user role on the primary site. VRM virtual machine Datastore.Browse datastore Recover virtual Secondary vCenter Server root recovery user Datastore.Low level file operations machines. folder with propagation. Virtual Alternatively, secondary machine.Configuration.Add vCenter Server root folder existing disk without propagation, target datastore, target virtual machine Virtual without propagation, target machine.Configuration.Add or virtual machine folder with remove device propagation, target host or Virtual machine.Interaction.Power cluster with propagation. On Virtual machine.Interaction.Device connection Virtual machine.Inventory.Register Resource.Assign virtual machine to resource pool VMware, Inc. 17
  • 18. Site Recovery Manager Administration 18 VMware, Inc.
  • 19. Creating SRM Placeholders and Mappings 2 When you use SRM to configure the protection for virtual machines, you reserve resources on the recovery site by creating placeholders. You map the resources of the protected virtual machines to resources on the recovery site. n About Placeholder Virtual Machines on page 19 When you add a virtual machine or template to a protection group, SRM creates a placeholder virtual machine at the recovery site. n About Inventory Mappings on page 20 You must create inventory mappings so that SRM can create placeholder virtual machines. n About Placeholder Datastores on page 21 For every virtual machine in a protection group, SRM creates a placeholder virtual machine at the recovery site. You must identify a datastore on the recovery site in which SRM can store the placeholder virtual machines. n Configure Datastore Mappings for vSphere Replication on page 22 You configure datastore mappings to determine which datastores vSphere Replication uses to store replicated virtual machine disks and configuration files at the recovery site. About Placeholder Virtual Machines When you add a virtual machine or template to a protection group, SRM creates a placeholder virtual machine at the recovery site. SRM reserves a place for protected virtual machines in the inventory of the recovery site by creating a subset of virtual machine files. SRM uses that subset of files as a placeholder to register a virtual machine with vCenter Server on the recovery site. The presence of placeholder in the recovery site inventory provides a visual indication to SRM administrators that the virtual machines are protected. The placeholders also indicate to vCenter Server administrators that the virtual machines can power on and start consuming local resources when SRM tests or runs a recovery plan. When you recover a protected virtual machine by testing or running a recovery plan, SRM replaces its placeholder with the recovered virtual machine and powers it on according to the settings of the recovery plan. After a recovery plan test finishes, SRM restores the placeholders and powers off the virtual machines as part of the cleanup process. VMware, Inc. 19
  • 20. Site Recovery Manager Administration About Placeholder Virtual Machine Templates When you protect a template on the protected site, SRM creates the placeholder template by creating a virtual machine in the default resource pool of a compute resource and then by marking that virtual machine as a template. SRM selects the compute resource from the set of available compute resources in the datacenter on the recovery site to which the folder of the virtual machine on the protected site is mapped. All the hosts in the selected compute resource must have access to at least one placeholder datastore. At least one host in the compute resource must support the hardware version of the protected virtual machine template. About Inventory Mappings You must create inventory mappings so that SRM can create placeholder virtual machines. Inventory mappings provide a convenient way to specify how SRM maps virtual machine resources at the protected site to resources at the recovery site. SRM applies these mappings to all members of a protection group when you create the group. You can reapply mappings whenever necessary, for example when you add new members to a group. SRM does not enforce an inventory mapping requirement. If you create a protection group without defining inventory mappings, you must configure each protected virtual machine individually or use the Configure All option. SRM cannot protect a virtual machine unless it has valid inventory mappings for key virtual machine resources. n Networks n Folders n Compute resources n Placeholder datastores After you configure mappings at the protected site when you configure protection, configure inventory mappings at the recovery site to enable reprotect. When SRM creates a placeholder virtual machine, SRM derives its folder and compute resource assignments from inventory mappings that you establish at the protected site. A vCenter Server administrator at the recovery site can modify folder and compute resource assignments as necessary. Configuring Inventory Mappings for Individual Virtual Machines You can configure mappings for individual virtual machines in a protection group. If you create inventory mappings for a site, you can override them by configuring the protection of individual virtual machines. If you must override inventory mappings for some members of a protection group, use the vSphere Client to connect to the recovery site, and edit the settings of the placeholder virtual machines or move them to a different folder or resource pool. Changing Inventory Mappings If you change existing inventory mappings for a site, the changes do not affect virtual machines that SRM already protects. SRM only applies the new mappings to newly added virtual machines or if you repair a lost placeholder for a particular virtual machine. Because placeholder virtual machines do not support NICs, you cannot change the network configurations of placeholder virtual machines. You can only change the network for a placeholder virtual machine in the inventory mappings. If no mapping for a network exists, you can specify a network when you configure protection for an individual virtual machine. Changes that you make to the placeholder virtual machine override the settings that you establish when you configure the protection of the virtual machine. SRM preserves these changes at the recovery site during the test and recovery. 20 VMware, Inc.
  • 21. Chapter 2 Creating SRM Placeholders and Mappings How SRM Applies Mappings During Reprotect During reprotect, SRM converts the virtual machines from the original protected site into placeholders, to protect the recovered virtual machines that were formerly the placeholder virtual machines on the recovery site. In most cases, the previously protected virtual machines and their devices are used during reprotect. If you add devices to a virtual machine after the virtual machine is recovered, or if original protected virtual machines are deleted, SRM uses mappings during reprotect. Select Inventory Mappings Inventory mappings provide default locations and networks for virtual machines to use when SRM creates placeholder virtual machines on the recovery site. Unless you intend to configure mappings individually for each member of a protection group, you should configure inventory mappings for a site before you create protection groups. Procedure 1 Click Sites in the left pane and select the site for which to configure inventory mappings. 2 Select a tab for a type of inventory object to configure. You can choose between the Resource Mappings tab, Folder Mappings tab, and Network Mappings tab. 3 Select an inventory object and click Configure Mapping. 4 Expand the inventory items and navigate to the network, folder, or resource pool on the recovery site to which to map the protected site resource. 5 (Optional) Select how to create the mapping: n Select an existing resource from the list. n Click New Folder or New Resource Pool to create a folder or resource pool on the recovery site to which to map. The selected resource appears in the Recovery Site Resources column, and its path relative to the root of the vCenter Server on the recovery site appears in the Recovery Site Path column. 6 Repeat Step 2 through Step 4 for any resource types for which to establish mappings. About Placeholder Datastores For every virtual machine in a protection group, SRM creates a placeholder virtual machine at the recovery site. You must identify a datastore on the recovery site in which SRM can store the placeholder virtual machines. After you select the datastore to contain the placeholder virtual machines, SRM reserves a place for protected virtual machines in the inventory on the recovery site. SRM creates a set of virtual machine files on the specified datastore at the recovery site and uses that subset to register the placeholder virtual machine with vCenter Server on the recovery site. When using array-based replication, to enable planned migration and reprotect, you must select placeholder datastores at both sites. Placeholder datastores must meet certain criteria. n For clusters, the placeholder datastores must be visible to all of the hosts in the cluster. n You cannot replicate placeholder datastores. VMware, Inc. 21
  • 22. Site Recovery Manager Administration Configure a Placeholder Datastore You can specify a placeholder datastore for SRM to use for the storage of placeholder virtual machines. Prerequisites Verify that you connected and paired the protected and recovery sites. Procedure 1 Select Sites in the left pane, and select a site 2 Click the Placeholder Datastores tab. 3 Click Configure Placeholder Datastore. 4 Expand the folders to find a datastore to designate as the location for placeholder virtual machines, click the datastore, and click OK. NOTE If an array manager is replicating datastores, but the array manager is not configured with SRM, the option to select the replicated datastore might be available. Do not select replicated datastores. Previously configured and replicated datastores appear but you cannot select them. The selected placeholder datastore appears in the Datastore column. If the datastore is on a standalone host, the host name appears. If the datastore is on a host that is in a cluster, the cluster name appears. Configure Datastore Mappings for vSphere Replication You configure datastore mappings to determine which datastores vSphere Replication uses to store replicated virtual machine disks and configuration files at the recovery site. You can use datastore mappings when you configure vSphere Replication for virtual machines as a way to select the default destination datastores. You configure datastore mappings from the source datastores of the virtual machines being configured for replication to destination datastores for the replicated files. A source datastore can be a single datastore that contains a single virtual machine, or it can be many datastores with many virtual machines with files spread across the datastores. When you configure replication for a single virtual machine, you can override the datastore mappings for a site, but when you configure replication for multiple virtual machines, you can use only the site-wide datastore mappings, and you cannot override them. Procedure 1 Click vSphere Replication in the left pane, and select a site. 2 Click the Datastore Mappings tab, and select a source datastore. 3 Click Configure Mapping. 4 Browse through the hierarchy of datastores at the recovery site and select a datastore to which to map. 22 VMware, Inc.
  • 23. Replicating Virtual Machines 3 Before you create protection groups, you must configure replication on the virtual machines to protect. You can replicate virtual machines by using either array-based replication, vSphere Replication, or a combination of both. This information concerns replication using vSphere Replication. To configure array-based replication on virtual machines, consult the documentation from your storage array manager (SRA) vendor. This chapter includes the following topics: n “Configure Replication for a Single Virtual Machine,” on page 23 n “Configure Replication for Multiple Virtual Machines,” on page 24 n “Replicate Virtual Machines Using Replication Seeds,” on page 25 n “Move a Virtual Machine to a New vSphere Replication Server,” on page 26 Configure Replication for a Single Virtual Machine vSphere Replication can protect individual virtual machines and their virtual disks by replicating them to another location. When you configure replication, you set a recovery point objective (RPO) to determine the period of time between replications. For example, an RPO of 1 hour seeks to ensure that a virtual machine loses no more than 1 hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network bandwidth is consumed keeping the replica up to date. Every time that a virtual machine reaches its RPO target, vSphere Replication records approximately 3800 bytes of data in the vCenter Server events database. If you set a low RPO period, this can quickly create a large volume of data in the database. To avoid creating large volumes of data in the vCenter Server events database, limit the number of days that vCenter Server retains event data. See Configure Database Retention Policy in the vCenter Server and Host Management Guide. Alternatively, set a higher RPO value. The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows Server 2003, XP, or newer. vSphere Replication does not support quiescing for Linux and older versions of Windows such as Windows 2000, so this option is unavailable for those operating systems. vSphere Replication supports file-system level quiescing for Windows 7 and Windows 2008 and application-level quiescing for Windows Server 2008 and Windows Server 8 operating systems. You configure replication by selecting all or a subset of the virtual machine's disks. You specify the target location for your virtual machine. You can either replicate the whole virtual disk initially, or use the existing disk as a replication seed to limit the replication to just the parts of the disk that have changed since the last replication. VMware, Inc. 23
  • 24. Site Recovery Manager Administration Prerequisites Verify that you have deployed and connected vSphere Replication appliances and SRM Server instances at each site. Procedure 1 On the vSphere Client Home page, click VMs and Templates. 2 Browse the inventory to find the single virtual machine to replicate using vSphere Replication. 3 Right-click the virtual machine and click vSphere Replication. 4 Use the RPO slider or enter a value to configure the maximum amount of data that can be lost in the case of a site failure. The available range is from 15 minutes to 24 hours. 5 Select a Guest OS Quiescing configuration, if applicable to the source virtual machine operating system. 6 If no target file location is specified or to override the default determined by the datastore mappings, click Browse to select a target location for the virtual machine. Option Description Place virtual machine in a datastore Select a datastore and click OK. directly Place virtual machine in a specific Select Specify datastore folder, click Browse to locate the folder, then folder in a datastore double-click the desired folder. 7 Select a replication destination for each media device for the virtual machine. The next pages are created dynamically depending on the media devices installed on the virtual machine. They might include multiple virtual drives, all of which you can configure individually. Configurable settings include whether the virtual drive is replicated, the virtual drive's replication destination, and information about how the replicated virtual drive is configured. If the disk is to be replicated, select a replication destination for the disk before proceeding. 8 Accept the automatic assignment of a vSphere Replication server or select a particular server on the target site. 9 Review the settings and click Finish to establish replication. Configure Replication for Multiple Virtual Machines vSphere Replication can replicate multiple virtual machines. When you configure replication, you set a recovery point objective (RPO) to determine the period of time between replications. For example, an RPO of 1 hour seeks to ensure that a virtual machine loses no more than 1 hour of data during the recovery. For smaller RPOs, less data is lost in a recovery, but more network bandwidth is consumed keeping the replica up to date. Every time that a virtual machine reaches its RPO target, vSphere Replication records approximately 3800 bytes of data in the vCenter Server events database. If you set a low RPO period, this can quickly create a large volume of data in the database. To avoid creating large volumes of data in the vCenter Server events database, limit the number of days that vCenter Server retains event data. See Configure Database Retention Policy in the vCenter Server and Host Management Guide. Alternatively, set a higher RPO value. 24 VMware, Inc.
  • 25. Chapter 3 Replicating Virtual Machines The available quiescing types are determined by the virtual machine's operating system. Microsoft Volume Shadow Copy Service (VSS) quiescing is supported for Windows virtual machines running Windows Server 2003, XP, or newer. vSphere Replication does not support quiescing for Linux and older versions of Windows such as Windows 2000, so this option is unavailable for those operating systems. vSphere Replication supports file-system level quiescing for Windows 7 and Windows 2008 and application-level quiescing for Windows Server 2008 and Windows Server 8 operating systems. Prerequisites To replicate virtual machines using vSphere Replication, you must deploy the vSphere Replication appliance at the primary and secondary sites. You must power on the virtual machines to begin replication. Before you replicate multiple machines, configure datastore mappings in the SRM user interface. You configure the mappings so that information is available to SRM regarding the target datastore destinations for replication. Procedure 1 On the vSphere Web Client Home page, click VMs and Templates. 2 Select a folder or datacenter in the left pane and click the Virtual Machines tab. 3 Select the virtual machines to replicate using the Ctrl or Shift keys. 4 Right-click the virtual machines and click vSphere Replication. 5 Use the RPO slider or enter a value to configure the maximum amount of data that can be lost in the case of a site failure. The available range is from 15 minutes to 24 hours. 6 Select a Guest OS Quiescing configuration, if applicable to the source virtual machine operating system. 7 (Optional) Choose whether to enable Initial copies of .vmdk files have been placed on the target datastore. Select this option if you have physically copied VMDK files to the target site for use as replication seeds. SRM uses datastore mappings and source virtual machine information to find and use initial copies. SRM shows progress and status as it searches for initial copies. You can stop the search process or start it again. 8 Accept the automatic assignment of a vSphere Replication server or select a particular server on the target site. 9 Review the settings and click Finish to establish replication. 10 Select the vSphere Replication view in the SRM interface. 11 Select the remote vSphere Replication site and click the Virtual Machines tab. If you have configured the datastore mappings for vSphere Replication, the virtual machines synchronize with the target site. What to do next If you did not configure the datastore mappings for vSphere Replication before configuring replication, the virtual machines appear in red with the status Datastore mappings were not configured. Reconfigure vSphere Replication on the virtual machines manually. Replicate Virtual Machines Using Replication Seeds You can make the initial replication of VDMK files more efficient by physically moving files onto a storage device. vSphere Replication uses the physically moved files as replication seeds. You might need to use replication seeds if it is not practical to copy the files over the network because the amount of data is too large, the bandwidth available is too small, or some combination of the two. VMware, Inc. 25
  • 26. Site Recovery Manager Administration When replicating virtual machines, ensure that virtual machines are replicated to subdirectories in datastores. Copied disks work if the transfer method preserves the identity information stored in the VMDK file. Prerequisites To replicate a virtual machine using vSphere Replication, you must establish the vSphere Replication infrastructure at both sites. The SRM Server instances at each site must be paired, and the vSphere Replication appliances must be paired. If a virtual machine is powered off, replication begins when the virtual machine is powered on. Procedure 1 Use the vSphere Client to connect to a vCenter Server that can manage the virtual machines to be physically moved. 2 Click Datastores. 3 In the left pane, browse to the datastore that contains the files for the virtual machine, select the datastore, and in the right pane, click Browse this datastore. 4 Select the folders for all virtual machines to be physically moved, right-click the selection, and click Download. 5 Select a destination to which to copy the files and click OK. 6 Click Yes. 7 After the download finishes, transfer the files to a location on the paired site to upload them. 8 On the vSphere Client Home page at the paired site, click Datastores. 9 In the left pane, browse to the datastore to contain the files for the virtual machine, select the datastore, and in the right pane, click Browse this datastore. 10 Select the folder to contain the copies of the virtual machines, right-click the selection, and click Upload Folder. 11 Select the folder containing the virtual machines, and click OK. Move a Virtual Machine to a New vSphere Replication Server After establishing vSphere Replication, you can move the virtual machines that you replicate to other vSphere Replication servers. You might do this to complete maintenance tasks on existing servers or to balance the load on the servers if one server becomes overloaded with virtual machines. Procedure 1 Select the vSphere Replication view of the SRM client. 2 Select a vSphere Replication server and click the Virtual Machines tab. 3 Right-click a virtual machine on which you have configured replication and select Move to. 4 Select a vSphere Replication server and click Next. 5 Review the information about the planned move, and click Finish. 26 VMware, Inc.
  • 27. Creating Protection Groups 4 After you configure a replication solution, you can create protection groups. A protection group is a collection of virtual machines and templates that you protect together by using SRM. You include one or more protection groups in each recovery plan. A recovery plan specifies how SRM recovers the virtual machines in the protection groups that it contains. You must configure the virtual machines in a protection group so that SRM can add them to the vCenter Server inventory at the recovery site. You configure virtual machines and create protection groups differently depending on whether you use array- based replication or vSphere Replication. You cannot create protection groups that combine virtual machines for which you configured array-based replication with virtual machines for which you configured vSphere Replication. However, you can include array-based protection groups and vSphere Replication protection groups in the same recovery plan. n About Array-Based Protection Groups and Datastore Groups on page 27 When you create a protection group for array-based replication, you specify array information and then SRM computes the set of virtual machines into a datastore group. Datastore groups contain all the files of the protected virtual machines. n Create vSphere Replication Protection Groups on page 30 You can create protection groups that contain virtual machines that vSphere Replication protects. n Apply Inventory Mappings to All Members of a Protection Group on page 31 When you create a protection group for either vSphere Replication or array-based replication, SRM applies your inventory mappings to all the virtual machines in the protection group. If you change the inventory mappings, add virtual machines to a protected datastore, or if the virtual machines lose their protection, you can reapply the mappings to all unconfigured virtual machines in one step. About Array-Based Protection Groups and Datastore Groups When you create a protection group for array-based replication, you specify array information and then SRM computes the set of virtual machines into a datastore group. Datastore groups contain all the files of the protected virtual machines. Protection groups consist of virtual machines that use the same datastore group. A datastore group consists of consistency groups. All of the virtual machines and templates in a consistency group replicate their files together, and all the virtual machines in the consistency group recover together. You can have a virtual machine with files on different datastores. In this case, SRM combines the datastores that contain files for a single virtual machine to create a datastore group. VMware, Inc. 27
  • 28. Site Recovery Manager Administration A datastore group is the smallest unit of storage that SRM can recover or test independently. When you create an array-based protection group, it initially contains only those virtual machines that store all of their files on one of the datastore groups that SRM associates with the protection group. A protection group can contain one or more datastore groups, but a datastore group can belong to only one protection group. You can add virtual machines to a protection group by creating them on one of the datastores that belong to the datastore groups that SRM associates with the protection group. You can also add virtual machines to the protection group by using Storage vMotion to move their storage to one of the datastores in the datastore group. You can remove a member from a protection group by moving the virtual machine's files to another datastore. To configure array-based replication, you must assign each virtual machine to a resource pool, folder, and network that exist at the recovery site. You can specify defaults for these assignments by selecting inventory mappings. SRM applies inventory mappings when you create the protection group. If you do not specify inventory mappings, you must configure them individually for each member of the protection group. SRM does not protect virtual machines that you did not configure or that you incorrectly configured for replication, even if they reside on a protected datastore. n How SRM Computes Datastore Groups on page 28 SRM determines the composition of a datastore group by the set of virtual machines that have files on the datastores in the group, and by the devices on which those datastores are stored. n Create Array-Based Protection Groups on page 29 You create array-based protection groups to enable the protection of virtual machines in datastore groups that you configure to use array-based replication. n Edit Array-Based Protection Groups on page 30 You can change the name and description of an array-based protection group and add or remove datastore groups that are part of the protection group. How SRM Computes Datastore Groups SRM determines the composition of a datastore group by the set of virtual machines that have files on the datastores in the group, and by the devices on which those datastores are stored. When you use array-based replication, each storage array supports a set of replicated devices. On storage area network (SAN) arrays that use connection protocols such as Fibre Channel and iSCSI, these devices are called logical storage units (LUN) and are composed of one or more physical devices. On network file system (NFS) arrays, the replicated devices are typically referred to as volumes. In every pair of replicated storage devices, one device is the replication source and the other is the replication target. Data written to the source device is replicated to the target device on a schedule controlled by the replication software of the array. When you configure SRM to work with an SRA, the replication source is at the protected site and the replication target is at the recovery site. A datastore provides storage for virtual machine files. By hiding the details of physical storage devices, datastores simplify the allocation of storage capacity and provide a uniform model for meeting the storage needs of virtual machines. Because any datastore can span multiple devices, SRM must ensure that all devices backing the datastore are replicated before it can protect the virtual machines that use that datastore. SRM must ensure that all devices containing protected virtual machine files are replicated. During a recovery or test, SRM must handle all such devices together. To achieve this goal, SRM aggregates datastores into datastore groups to accommodate virtual machines that span multiple datastores. SRM regularly checks that datastore groups contain all necessary datastores to provide protection for the appropriate virtual machines. When necessary, SRM recalculates datastore groups. For example, this can occur when you add new devices to a virtual machine, and you store those devices on a datastore that was not previously a part of the datastore group. 28 VMware, Inc.
  • 29. Chapter 4 Creating Protection Groups A datastore group consists of the smallest set of devices required to ensure that if any of a virtual machine's files is stored on a device in the group, all of the virtual machine's files are stored on devices that are part of the same group. For example, if a virtual machine has disks on two different datastores, then SRM combines both datastores into a datastore group. SRM also combines devices into datastore groups according to set criteria. n A virtual machine has files on two different datastores. n Two virtual machines share a raw disk mapping (RDM) device on a SAN array, as in the case of a Microsoft cluster server (MSCS) cluster. n Two datastores span extents corresponding to different partitions of the same device. n A single datastore spans two extents corresponding to partitions of two different devices. n Multiple devices belong to a consistency group. A consistency group is a collection of replicated devices where every state of the target set of devices existed at a specific time as the state of the source set of devices. Informally, the devices are replicated together such that when recovery happens using those devices, software accessing the targets does not see the data in a state that the software is not prepared to deal with. Create Array-Based Protection Groups You create array-based protection groups to enable the protection of virtual machines in datastore groups that you configure to use array-based replication. SRM discovered the datastore groups when you configured the array managers. SRM replicates to the recovery site each datastore group that you select. After you create a protection group, SRM creates placeholder virtual machines and applies inventory mappings for each virtual machine in the group. If SRM cannot map a virtual machine to a folder, network, and resource pool on the recovery site, SRM sets the virtual machine in the Mapping Missing status, and does not create a placeholder for it. You can organize protections groups in folders. Different views in the Recovery interface display the names of the recovery groups, but they do not display the folder names. If you have two protection groups with the same name in different folders, it might be difficult to tell them apart in some views in the Recovery interface. Consequently, ensure that protection names are unique across all folders. In environments in which not all users have view privileges for all folders, to be sure of the uniqueness of protection group names, do not place protection groups in folders. When you create protection groups, wait to ensure that the operations finish as expected. Make sure that SRM creates the protection group and that the protection of the virtual machines in the group is successful. Procedure 1 Click Protection Groups, and click Create Protection Group. 2 On the Select a Site and Protection Group Type page, select which site to protect and select Array Based Replication. 3 Select an array pair, and click Next. 4 Select a datastore group from the list, and click Next. When you select a datastore group, the virtual machines in that datastore group appear in the Virtual Machines on the Selected Datastore Group pane, and are marked for inclusion in the protection group after you create the protection group. 5 Type a name and optional description for the protection group, and click Next. VMware, Inc. 29
  • 30. Site Recovery Manager Administration 6 Click Finish to create the protection group and begin the protection of the specified virtual machines. You can monitor the progress of the tasks to create the protection group and protect the virtual machines in the Recent Tasks panel of the vSphere Client. What to do next Create a recovery plan with which to associate your protection groups. See “Create a Recovery Plan,” on page 37. Edit Array-Based Protection Groups You can change the name and description of an array-based protection group and add or remove datastore groups that are part of the protection group. Procedure 1 Click Protection Groups, right-click an array-based protection group and select Edit Protection Group. 2 Click Next. 3 Add or remove datastore groups in the protection group and click Next. 4 Edit the name or description of the protection group and click Next. 5 Click Finish. Create vSphere Replication Protection Groups You can create protection groups that contain virtual machines that vSphere Replication protects. You can organize protections groups in folders. Different views in the Recovery interface display the names of the recovery groups, but they do not display the folder names. If you have two protection groups with the same name in different folders, it might be difficult to tell them apart in some views in the Recovery interface. Consequently, ensure that protection names are unique across all folders. In environments in which not all users have view privileges for all folders, to be sure of the uniqueness of protection group names, do not place protection groups in folders. When you create a vSphere Replication protection group, you can add to the protection group any virtual machines that you configured for vSphere Replication. Prerequisites Use the vSphere Client to configure vSphere Replication for virtual machines. See “Configure Replication for a Single Virtual Machine,” on page 23 or “Configure Replication for Multiple Virtual Machines,” on page 24. Procedure 1 Click Protection Groups and click Create Protection Group. 2 Select the site to be the protected site, select vSphere Replication, and click Next. 3 Select virtual machines from the list and click Next. Only virtual machines that you configured for vSphere Replication and that are not already in a protection group appear in the list. 4 Type a name and optional description for the protection group, and click Next. 5 Click Finish to create the protection group. What to do next Create a recovery plan with which to associate your protection groups. See “Create a Recovery Plan,” on page 37. 30 VMware, Inc.
  • 31. Chapter 4 Creating Protection Groups Edit vSphere Replication Protection Groups You can edit a vSphere Replication protection group to change its name and to add virtual machines to the group. Procedure 1 Click Protection Groups in the left pane and right-click a protection group. 2 Select Edit Protection Group and click Next. You cannot change the Protected Site or Protection Group Type settings. 3 Add virtual machines to the protection group and click Next. 4 Edit the name or description of the protection group and click Next. 5 Click Finish. Apply Inventory Mappings to All Members of a Protection Group When you create a protection group for either vSphere Replication or array-based replication, SRM applies your inventory mappings to all the virtual machines in the protection group. If you change the inventory mappings, add virtual machines to a protected datastore, or if the virtual machines lose their protection, you can reapply the mappings to all unconfigured virtual machines in one step. Procedure 1 Click Protection Groups in the left pane, select a protection group, and click the Virtual Machines tab. 2 Click Configure All. VMware, Inc. 31
  • 32. Site Recovery Manager Administration 32 VMware, Inc.
  • 33. Creating, Testing, and Running Recovery Plans 5 After you configure SRM at the protected and recovery sites, you can create, test, and run a recovery plan. A recovery plan is like an automated run book. It controls every step of the recovery process, including the order in which SRM powers on and powers off virtual machines, the network addresses that recovered virtual machines use, and so on. Recovery plans are flexible and customizable. A recovery plan includes one or more protection groups. You can include a protection group in more than one recovery plan. For example, you can create one recovery plan to handle a planned migration of services from the protected site to the recovery site, and another plan to handle an unplanned event such as a power failure or natural disaster. Having these different recovery plans allows you to decide how to perform recovery. Testing a recovery plan runs the plan without affecting services at the protected or recovery sites, apart from powering off any virtual machines on the recovery site if you configure the recovery plan to do so. You can perform planned migrations from the protected site to the recovery site or disaster recoveries by running a recovery plan. You can run only one recovery plan at a time to recover a particular protection group. If you simultaneously test or run multiple recovery plans that specify the same protection group, only one recovery plan can fail over the protection group. Other running recovery plans that specify the same protection group report warnings for that protection group and the virtual machines it contains. The warnings explain that the virtual machines were recovered, but do not report other protection groups that the other recovery plans cover. n Testing a Recovery Plan on page 34 When you create or modify a recovery plan, test it before you try to use it for planned migration or for disaster recovery. n Performing a Planned Migration or Disaster Recovery By Running a Recovery Plan on page 34 You can run a recovery plan under planned circumstances to migrate virtual machines from the protected site to the recovery site. You can also run a recovery plan under unplanned circumstances if the protected site suffers an unforeseen event that might result in data loss. n Differences Between Testing and Running a Recovery Plan on page 35 Testing a recovery plan has no lasting effects on either the protected site or the recovery site, but running a recovery plan has significant effects on both sites. n How SRM Interacts with DPM and DRS During Recovery on page 36 Distributed Power Management (DPM) and Distributed Resource Scheduler (DRS) are not mandatory, but SRM supports both services and enabling them provides certain benefits when you use SRM. n Create, Test, and Run a Recovery Plan on page 36 You perform several sets of tasks to create, test, and run a recovery plan. VMware, Inc. 33
  • 34. Site Recovery Manager Administration n Cancel a Test or Recovery on page 40 You can cancel a recovery plan test at any time during its run. You can cancel a planned migration or disaster recovery at certain times during its run. n Delete a Recovery Plan on page 40 You can delete a recovery plan if you do not need it. Testing a Recovery Plan When you create or modify a recovery plan, test it before you try to use it for planned migration or for disaster recovery. By testing a recovery plan, you ensure that the virtual machines that the plan protects recover correctly to the recovery site. If you do not test recovery plans, an actual disaster recovery situation might not recover all virtual machines, resulting in data loss. Testing a recovery plan exercises nearly every aspect of a recovery plan, although SRM makes several concessions to avoid disrupting ongoing operations on the protected and recovery sites. Recovery plans that suspend local virtual machines do so for tests as well as for actual recoveries. With this exception, running a test recovery does not disrupt replication or ongoing activities at either site. You can run test recoveries as often as necessary. You can cancel a recovery plan test at any time. Permission to test a recovery plan does not include permission to run a recovery plan. Permission to run a recovery plan does not include permission to test a recovery plan. You must assign each permission separately. See “Assign Roles and Permissions,” on page 10. Test Networks and Datacenter Networks When you test a recovery plan, SRM can create a test network that it uses to connect recovered virtual machines. Creating a test network allows the test to run without potentially disrupting virtual machines in the production environment. The test network is managed by its own virtual switch, and in most cases recovered virtual machines can use the network without having to change network properties such as IP address, gateway, and so on. You use the test network by selecting Auto when you configure the network settings when you run a test. A datacenter network is a network that typically supports existing virtual machines at the recovery site. To use it, recovered virtual machines must conform to its network address availability rules. These virtual machines must use a network address that the network's switch can serve and route, must use the correct gateway and DNS host, and so on. Recovered virtual machines that use DHCP can connect to this network without additional customization. Other virtual machines require IP customization and additional recovery plan steps to apply the customization. You must recover any virtual machines that must interact with each other to the same test network. For example, if a Web server accesses information on a database, those Web server and database virtual machines should recover together to the same network. Performing a Planned Migration or Disaster Recovery By Running a Recovery Plan You can run a recovery plan under planned circumstances to migrate virtual machines from the protected site to the recovery site. You can also run a recovery plan under unplanned circumstances if the protected site suffers an unforeseen event that might result in data loss. During a planned migration, SRM synchronizes the virtual machines on the recovery site with the virtual machines on the protected site, then stops replication. SRM attempts to replicate all virtual machines and gracefully shut down the protected machines. If errors occur during a planned migration, the plan stops so that you can resolve the errors and rerun the plan. You can reprotect the virtual machines after the recovery. 34 VMware, Inc.
  • 35. Chapter 5 Creating, Testing, and Running Recovery Plans During disaster recoveries, SRM restores virtual machines on the recovery site to their most recent available state, according to the recovery point objective (RPO). When you run a recovery plan to perform a disaster recovery, SRM attempts to shut down the virtual machines on the protected site. If SRM cannot shut down the virtual machines, SRM still starts the copies at the recovery site, and automatic reprotect might not be possible. If SRM detects that a datastore on the protected site is in the all paths down (APD) state and is preventing a virtual machine from shutting down, SRM waits for a period before attempting to shut down the virtual machine again. The APD state is usually transient, so by waiting for a datastore in the APD state to come back online, SRM can gracefully shut down the protected virtual machines on that datastore. After SRM completes the final replication, SRM makes changes at both sites that require significant time and effort to reverse. Because of this time and effort, you must assign the privilege to test a recovery plan and the privilege to run a recovery plan separately. Running a Recovery with Forced Recovery If the protected site is offline and SRM cannot perform its usual tasks, you can run the recovery with the forced recovery option. Forced recovery is for use in cases where storage arrays fail at the protected site and, as a result, protected virtual machines are unmanageable and cannot be shut down, powered off, or unregistered. In such a case, the system state cannot be changed for extended periods. To resolve this situation, you can force failover. Forcing failover does not complete the process of shutting down the virtual machines at the protected site. As a result, a split-brain scenario occurs, but the recovery might complete more quickly. Running forced recovery with array-based replication can affect the mirroring between the protected and the recovery storage arrays. After you run forced recovery, you must check that mirroring is set up correctly between the protected array and the recovery array before you can perform further replication operations. If mirroring is not set up correctly, you must repair the mirroring by using the storage array software. When you enable forced recovery, any outstanding changes on the protection site are not replicated to the recovery site before the failover sequence begins. Replication of the changes occurs according to the recovery point objective (RPO) period of the storage array. If a new virtual machine or template is added on the protection site and failover is initiated before the storage RPO period has elapsed, the new virtual machine or template does not appear on the replicated datastore and is lost. To avoid losing the new virtual machine or template, wait until the end of the RPO period before running the recovery plan with forced recovery. After the forced recovery completes and you have verified the mirroring of the storage arrays, you can resolve the issue that necessitated the forced recovery. After you resolve the underlying issue, run planned migration on the recovery plan again, resolve any problems that occur, and rerun the plan until it finishes successfully. Running the recovery plan again does not affect the recovered virtual machines at the recovery site. Differences Between Testing and Running a Recovery Plan Testing a recovery plan has no lasting effects on either the protected site or the recovery site, but running a recovery plan has significant effects on both sites. You need different privileges when testing and running a recovery plan. Table 5-1. How Testing a Recovery Plan Differs from Running a Recovery Plan Area of Difference Test a Recovery Plan Run a Recovery Plan Required privileges Requires Site Recovery Requires Site Recovery Manager.Recovery Plans.Test Manager.Recovery Plans.Recovery. permission. Effect on virtual machines at None SRM shuts down virtual machines in protected site reverse priority order. VMware, Inc. 35