SlideShare a Scribd company logo
1
2
Tips & Tricks
• Bitmap or Delta sync
• What’s the difference?
• Demystifying VRA compression
• And how to boost it
• Logs, logs, and more logs…
• How can you exit from that business?
• Networks
• Can’t live without them, and they can cause stress!
• Miscellaneous tools we all use
• Saves us precious time and dirty work
• Zerto Cmdlets
• Crack the shell with the Zerto PowerShell SnapIn!
• Collaborate!
3
A Delta Sync occurs when Zerto needs to verify the consistency of the
source (protected) and recovery disks.
Can occur if:
- Reverse Protection is enabled for a Failover or Move operation.
- VPGs are created with pre-seed disks.
- Reverting a protected VM to a snapshot – triggering an inconsistency.
During a Delta Sync, the VPG will go through an md5 checksum comparison
between the protected and recovery disks and writes any missing blocks.
Delta Sync Synopsis:
4
A Bitmap Sync occurs when the VRAs cannot send the
protected I/Os to the recovery site. We will discuss the
various reasons in the next slide.
Zerto uses a bit-map to track the changes between the
protected and recovery disks so that when VRA
connectivity is restored - the blocks that changed on the
protected site during the disconnection can be quickly
identified and send to the relevant recovery volumes.
Bitmap Sync Synopsis:
5
Some different scenarios include, but not limited to, the following:
1] Disconnection between VRAs.
2] The journal or recovery volumes encounter storage errors.
3] The source (protected) storage encounters I/O issues or if errors are
returned from the storage.
4] The VRA is unable to send Write I/Os fast enough.
5] The network is unable to sent protected IOs fast enough.
6] The recovery storage is not fast enough to handle the protected IOs.
Bitmap Sync Reasons:
6
How does compression work with Zerto?
1] The VRAs intercepts and buffers the protected I/Os at the host
level.
2] The VRA compresses these I/Os using CPU resources.
3] The VRA sends compressed I/Os across the WAN to the recovery
VRA where the I/Os are written to Journal.
4] The VRA decompresses the protected I/Os and applies them to
the recovery mirror.
VRA Compression Rates:
7
When can VRAs experience issues with compression?
The main reason a VRA would have issues with compression
is if there are CPU resources are constrained on the protected
VRA.
Note that decompression of I/Os does not take up as many
CPU cycles as compression.
Concerns with VRA Compression Rates:
8
Improving CPU utilization and Compression Rates:
Increasing the number of CPU cores from ‘1’ to ‘2 ‘on the protected
and recovery VRAs will help lower the CPU utilization rate and
improve the write I/O compression rates.
If reverse replication is specified during Failover/Move, upgrading
the peer site’s VRAs CPU cores will also help with write
compression rates.
Boosting VRA Compression Rates:
9
1] Log into vSphere
2] Shut down the VRA where you want to upgrade the CPU core count.
Right click the VRA > Power > Shut down guest
Boosting VRA Compression Rates Instructions
10
3] After the VRA has been shut down, Right click the VRA VM > Edit
Settings. In the "Hardware" section, click on CPUs and increase the
"Number of cores per socket" from ‘1’ to ‘2’ and click OK.
Boosting VRA Compression Rates
11
4] Power on the VRA
Right click the VRA > Power > Power On
Boosting VRA Compression Rates
12
5] Right click the VRA > Edit Settings and verify that CPUs is reporting "2".
Boosting VRA Compression Rates
13
Log, logs and more logs…
There must be an easier way!
14
• Log Collection: Then vs. Now
• What is Remote Log Collection?
• Security
• RLC Architecture
• Enabling Remote Log Collection
• Appendix
Agenda
14
15
15
Then……..
• Step ]1. Open a Support Case
• Step 2. Troubleshoot the issue with L1 Support
• Step 3. L1 Support collects logs directly while logged into the ZVM on a WebEx session
OR you, the customer gathers the logs manually
• Alerts:
• VPGs:
• Sites:
• VRAs:
• vCD:
• Hypervisor:
• Hosts:
• Step 4. Logs are automaticallymanually uploaded to one of Zerto’s FTP server – large
bundles would sometimes fail.
• Step 6. (Optional) Repeat process if new logs are needed or logs did not upload
correctly.
16
16
Log Collection used
to require manual
intervention with
Zerto Support
17
17
Case
information
would have
to be filled
out manually
which left
room for
human error.
18
18
In comes Remote Log Collection
From the ZVM GUI, navigate to Menu > Remote Support
*Administrator level privileges or User account with Manage Sites privileges are required
Support takes it from there!
Now……..
19
19
• Remote Log Collection provides Zerto Support the ability to gather
logs from your ZVM environment without direct intervention
• Remote Log Collection will take YOU out of the sequence and help
us to provide you faster turn around time on cases, with less
dependence on YOU
What is Remote Log Collection?
20
Worried about security?
• Outbound Connection ONLY
• Connection automatically terminates once case closes
• Linked by case number via Salesforce API
• Limited Access
• Transfer logs using HTTP/HTTPS protocol from ZVM to a Zerto
AWS S3 log Bucket
• Port 80 or 443
20
21
Networks
22
The Importance of Networks
Production
Site
vCente
r
VM VM
VM VRA
VM VM
VM VRA
BC/DR
Site
vCente
r
VM VM
VM VRA
VM VM
VM VRA
WAN/VPN
VM-Level Replication
ZVM ZVM
vDisk vDisk vDisk
Common Customer symptoms of a poorly performing network
• Elongated initial syncs
• Extended RPO’s
• More bitmap sync’ing than expected
• Network congestion
• VRA disconnects
• BC/DR “down”
23
• LAN
• MPLS
• IP Link over Fiber
• Site-to-Site VPN
Note - Zerto Virtual Replication does not support replicating through NAT
translated devices via port forwarding. For replication to occur through NAT
translated devices, all replication traffic must be within a VPN
Supported WAN Links
24
• VRA Default MTU = 1492
• VRA Default Sockets = 8
• Minimum 5Mbps dedicated bandwidth
• WAN Compression
• VPN/Firewall
• MPLS
• Network Filters
• Note - VRAs engage in PMTU discovery
VRA Network Performance Considerations
25
• zPerf – Test for effective available bandwidth between the VRAs
and maximum TCP socket allocation
• zCPerf – Designed for a cloud scheme, which runs from the ZCC
* Scripts are currently only available to Zerto support.
• iPerf - Can be used to measure the available bandwidth between
the ZVMs.
• Zerto WAN Sizing Tool
• Understand your write workload!
VRA Network Support Tools
26
Miscellaneous & Useful Tools
• Notepad++ - Free, available and versatile.
• Bare Tail – See logs live with keyword highlighting and tabs.
• Cmder – Multi terminal console for Windows that includes
Bash commands (grep, less, etc...) and Git integration.
• Wireshark – Network analysis and trace tool.
All of these tools save time and manual work, making it
easier for us to focus on the problem.
27
Zerto PowerShell Cmdlets
28
Zerto PowerShell CMDlets - Getting Started
In order to get started with Zerto’s PowerShell CMDlets, you will first need to
download the relevant Zerto PowerShell CMDlets installer.
Running it will install the Zerto module on that VM, (Does not have to be the
ZVM VM but has to have network access to it)
After the installation, we need to import the Zerto Snap-In into PowerShell:
powershell.exe -NoExit -Command Add-PSSnapIn Zerto.PS.Commands
29
Loading the CMDlets SnapIn Automatically
Indeed, there is a way to load the Zerto SnapIn, each time you
start PowerShell. This can be achieved using the following
method:
Add the SnapIn command to the powershell.exe path by adding
the following line into the PowerShell shortcut (right-click,
properties, shortcut):
"powershell.exe -NoExit -Command Add-PSSnapIn
Zerto.PS.Commands" - remember to add it after the
powershell.exe. Like so: powershell.exe {HERE}
30
Loading the CMDlets SnapIn Example
31
Zerto CMDlets Example
We’ll use ForceRemove-ProtectionGroup for this example:
(Each step prompts for a user input)
VirtualProtectionGroup: VPG name (Case sensitive!)
ZVMIP: If you are running this from the ZVM, you can use localhost
ZVMPort: Always 9080
Username: administrator (explanation on credentials slide)
Password: password (explanation on credentials slide)
Are you sure you want to perform this action?
[Y] Yes [A] Yes to All [N] No [L] No to All [S] Suspend [?] Help (default is "Y"):
This identifier is the task ID sent to the ZVM – essentially meaning it was
successful
32
Zerto CMDlets One Liner
The previous example showed an interactive PowerShell session where the
user had to input answers/information for each step.
You can run almost all CMDlets using a one line command, for example:
ForceRemove-ProtectionGroup –ZVMIP localhost –ZVMPort 9080 –Username
administrator –Password password –VirtualProtectionGroup ‘Test’ –
Confirm:$false
33
Zerto CMDlets Help
The most important part of all, is that you can type:
help cmdlet-name
and get a full argument and flags review of that cmdlet.
Example: help ForceRemove-ProtectionGroup
This will allow you to understand what exact argument you should
provide to the cmdlet. Not all are mandatory.
34
Zerto PowerShell CMDlets - Credentials
The user given in Zerto’s PowerShell CMDlets, is NOT the
vCenter or ZVM user.
These are separate credentials, stored in a text file at
C:Program FilesZertoZerto Virtual Replicationusers.txt
In this file, there is the user administrator, and a hash of a string,
to represent the password, which is by default “password”
35
Zerto PowerShell CMDlets - Credentials
You can create different users and passwords, but passwords will
always have to be hashed. There are many ways to hash a string
(http://www.sha1-online.com/), as many as there are to “un-hash” it.
In the ZVR installation folder: ‘Users.txt’ the username and password
combination, appears as so:
administrator 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
(separated by tab [just click the Tab button on the keyboard])
Any other credentials, should be listed exactly the same, with the
username first, Tab , and the password
36
Collaborate!
37
Thank You!
Tal Hayut
tal.hayut@zerto.com
38

More Related Content

Similar to ZertoCON_Support_Toolz.pdf

FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE PlatformsFIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
Velocidex Enterprises
 
Pandora FMS: Hyper V Plugin
Pandora FMS: Hyper V PluginPandora FMS: Hyper V Plugin
Pandora FMS: Hyper V Plugin
Pandora FMS
 
ESXpert strategies VMware vSphere
ESXpert strategies VMware vSphereESXpert strategies VMware vSphere
ESXpert strategies VMware vSphere
Concentrated Technology
 
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
VMworld
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
Aakash Agarwal
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
Kingston Smiler
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
VMware Academy
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
Finto Thomas , CISSP, TOGAF, CCSP, ITIL. JNCIS
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the Controllers
Roberto Soares
 
Giles Sirett: Introduction and CloudStack news
Giles Sirett: Introduction and CloudStack news   Giles Sirett: Introduction and CloudStack news
Giles Sirett: Introduction and CloudStack news
ShapeBlue
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
Sierraware
 
Impact 2009 1783 Achieving Availability With W A Sz User Experience
Impact 2009 1783  Achieving  Availability With  W A Sz   User ExperienceImpact 2009 1783  Achieving  Availability With  W A Sz   User Experience
Impact 2009 1783 Achieving Availability With W A Sz User Experience
Elena Nanos
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experience
Docker, Inc.
 
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld
 
Virtually Pwned
Virtually PwnedVirtually Pwned
Virtually Pwned
Claudio Criscione
 
Pandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise PluginPandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise Plugin
Pandora FMS
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Peter Hlavaty
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
Concentrated Technology
 

Similar to ZertoCON_Support_Toolz.pdf (20)

FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE PlatformsFIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
FIWARE Tech Summit - Docker Swarm Secrets for Creating Great FIWARE Platforms
 
Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3Digital Forensics and Incident Response in The Cloud Part 3
Digital Forensics and Incident Response in The Cloud Part 3
 
Pandora FMS: Hyper V Plugin
Pandora FMS: Hyper V PluginPandora FMS: Hyper V Plugin
Pandora FMS: Hyper V Plugin
 
ESXpert strategies VMware vSphere
ESXpert strategies VMware vSphereESXpert strategies VMware vSphere
ESXpert strategies VMware vSphere
 
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...
 
Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1Server And Hardware Virtualization_Aakash1.1
Server And Hardware Virtualization_Aakash1.1
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
VMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices PosterVMware End-User-Computing Best Practices Poster
VMware End-User-Computing Best Practices Poster
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
BsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the ControllersBsidesSP: Pentesting in SDN - Owning the Controllers
BsidesSP: Pentesting in SDN - Owning the Controllers
 
Giles Sirett: Introduction and CloudStack news
Giles Sirett: Introduction and CloudStack news   Giles Sirett: Introduction and CloudStack news
Giles Sirett: Introduction and CloudStack news
 
Sierraware ARM hypervisor
Sierraware ARM hypervisor Sierraware ARM hypervisor
Sierraware ARM hypervisor
 
Impact 2009 1783 Achieving Availability With W A Sz User Experience
Impact 2009 1783  Achieving  Availability With  W A Sz   User ExperienceImpact 2009 1783  Achieving  Availability With  W A Sz   User Experience
Impact 2009 1783 Achieving Availability With W A Sz User Experience
 
How to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experienceHow to accelerate docker adoption with a simple and powerful user experience
How to accelerate docker adoption with a simple and powerful user experience
 
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
VMworld 2013: How to Exchange Status Message Between Guest and Host Using RPC
 
Virtually Pwned
Virtually PwnedVirtually Pwned
Virtually Pwned
 
Pandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise PluginPandora FMS: VMware Enterprise Plugin
Pandora FMS: VMware Enterprise Plugin
 
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytesWindows Kernel Exploitation : This Time Font hunt you down in 4 bytes
Windows Kernel Exploitation : This Time Font hunt you down in 4 bytes
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
 

Recently uploaded

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Aggregage
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Kiwi Creative
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
Building a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdfBuilding a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdf
cjimenez2581
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
inaya7568
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
VyNguyen709676
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
ywqeos
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
exukyp
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
nuttdpt
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
lzdvtmy8
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
SaffaIbrahim1
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
aguty
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
vasanthatpuram
 

Recently uploaded (20)

Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
Beyond the Basics of A/B Tests: Highly Innovative Experimentation Tactics You...
 
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataPredictably Improve Your B2B Tech Company's Performance by Leveraging Data
Predictably Improve Your B2B Tech Company's Performance by Leveraging Data
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
Building a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdfBuilding a Quantum Computer Neutral Atom.pdf
Building a Quantum Computer Neutral Atom.pdf
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Jio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdfJio cinema Retention & Engagement Strategy.pdf
Jio cinema Retention & Engagement Strategy.pdf
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
writing report business partner b1+ .pdf
writing report business partner b1+ .pdfwriting report business partner b1+ .pdf
writing report business partner b1+ .pdf
 
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)伦敦商学院毕业证如何办理
 
UofT毕业证如何办理
UofT毕业证如何办理UofT毕业证如何办理
UofT毕业证如何办理
 
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
一比一原版(UCSF文凭证书)旧金山分校毕业证如何办理
 
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
一比一原版格里菲斯大学毕业证(Griffith毕业证书)学历如何办理
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docxDATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
DATA COMMS-NETWORKS YR2 lecture 08 NAT & CLOUD.docx
 
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
一比一原版澳洲西澳大学毕业证(uwa毕业证书)如何办理
 
Cell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docxCell The Unit of Life for NEET Multiple Choice Questions.docx
Cell The Unit of Life for NEET Multiple Choice Questions.docx
 

ZertoCON_Support_Toolz.pdf

  • 1. 1
  • 2. 2 Tips & Tricks • Bitmap or Delta sync • What’s the difference? • Demystifying VRA compression • And how to boost it • Logs, logs, and more logs… • How can you exit from that business? • Networks • Can’t live without them, and they can cause stress! • Miscellaneous tools we all use • Saves us precious time and dirty work • Zerto Cmdlets • Crack the shell with the Zerto PowerShell SnapIn! • Collaborate!
  • 3. 3 A Delta Sync occurs when Zerto needs to verify the consistency of the source (protected) and recovery disks. Can occur if: - Reverse Protection is enabled for a Failover or Move operation. - VPGs are created with pre-seed disks. - Reverting a protected VM to a snapshot – triggering an inconsistency. During a Delta Sync, the VPG will go through an md5 checksum comparison between the protected and recovery disks and writes any missing blocks. Delta Sync Synopsis:
  • 4. 4 A Bitmap Sync occurs when the VRAs cannot send the protected I/Os to the recovery site. We will discuss the various reasons in the next slide. Zerto uses a bit-map to track the changes between the protected and recovery disks so that when VRA connectivity is restored - the blocks that changed on the protected site during the disconnection can be quickly identified and send to the relevant recovery volumes. Bitmap Sync Synopsis:
  • 5. 5 Some different scenarios include, but not limited to, the following: 1] Disconnection between VRAs. 2] The journal or recovery volumes encounter storage errors. 3] The source (protected) storage encounters I/O issues or if errors are returned from the storage. 4] The VRA is unable to send Write I/Os fast enough. 5] The network is unable to sent protected IOs fast enough. 6] The recovery storage is not fast enough to handle the protected IOs. Bitmap Sync Reasons:
  • 6. 6 How does compression work with Zerto? 1] The VRAs intercepts and buffers the protected I/Os at the host level. 2] The VRA compresses these I/Os using CPU resources. 3] The VRA sends compressed I/Os across the WAN to the recovery VRA where the I/Os are written to Journal. 4] The VRA decompresses the protected I/Os and applies them to the recovery mirror. VRA Compression Rates:
  • 7. 7 When can VRAs experience issues with compression? The main reason a VRA would have issues with compression is if there are CPU resources are constrained on the protected VRA. Note that decompression of I/Os does not take up as many CPU cycles as compression. Concerns with VRA Compression Rates:
  • 8. 8 Improving CPU utilization and Compression Rates: Increasing the number of CPU cores from ‘1’ to ‘2 ‘on the protected and recovery VRAs will help lower the CPU utilization rate and improve the write I/O compression rates. If reverse replication is specified during Failover/Move, upgrading the peer site’s VRAs CPU cores will also help with write compression rates. Boosting VRA Compression Rates:
  • 9. 9 1] Log into vSphere 2] Shut down the VRA where you want to upgrade the CPU core count. Right click the VRA > Power > Shut down guest Boosting VRA Compression Rates Instructions
  • 10. 10 3] After the VRA has been shut down, Right click the VRA VM > Edit Settings. In the "Hardware" section, click on CPUs and increase the "Number of cores per socket" from ‘1’ to ‘2’ and click OK. Boosting VRA Compression Rates
  • 11. 11 4] Power on the VRA Right click the VRA > Power > Power On Boosting VRA Compression Rates
  • 12. 12 5] Right click the VRA > Edit Settings and verify that CPUs is reporting "2". Boosting VRA Compression Rates
  • 13. 13 Log, logs and more logs… There must be an easier way!
  • 14. 14 • Log Collection: Then vs. Now • What is Remote Log Collection? • Security • RLC Architecture • Enabling Remote Log Collection • Appendix Agenda 14
  • 15. 15 15 Then…….. • Step ]1. Open a Support Case • Step 2. Troubleshoot the issue with L1 Support • Step 3. L1 Support collects logs directly while logged into the ZVM on a WebEx session OR you, the customer gathers the logs manually • Alerts: • VPGs: • Sites: • VRAs: • vCD: • Hypervisor: • Hosts: • Step 4. Logs are automaticallymanually uploaded to one of Zerto’s FTP server – large bundles would sometimes fail. • Step 6. (Optional) Repeat process if new logs are needed or logs did not upload correctly.
  • 16. 16 16 Log Collection used to require manual intervention with Zerto Support
  • 17. 17 17 Case information would have to be filled out manually which left room for human error.
  • 18. 18 18 In comes Remote Log Collection From the ZVM GUI, navigate to Menu > Remote Support *Administrator level privileges or User account with Manage Sites privileges are required Support takes it from there! Now……..
  • 19. 19 19 • Remote Log Collection provides Zerto Support the ability to gather logs from your ZVM environment without direct intervention • Remote Log Collection will take YOU out of the sequence and help us to provide you faster turn around time on cases, with less dependence on YOU What is Remote Log Collection?
  • 20. 20 Worried about security? • Outbound Connection ONLY • Connection automatically terminates once case closes • Linked by case number via Salesforce API • Limited Access • Transfer logs using HTTP/HTTPS protocol from ZVM to a Zerto AWS S3 log Bucket • Port 80 or 443 20
  • 22. 22 The Importance of Networks Production Site vCente r VM VM VM VRA VM VM VM VRA BC/DR Site vCente r VM VM VM VRA VM VM VM VRA WAN/VPN VM-Level Replication ZVM ZVM vDisk vDisk vDisk Common Customer symptoms of a poorly performing network • Elongated initial syncs • Extended RPO’s • More bitmap sync’ing than expected • Network congestion • VRA disconnects • BC/DR “down”
  • 23. 23 • LAN • MPLS • IP Link over Fiber • Site-to-Site VPN Note - Zerto Virtual Replication does not support replicating through NAT translated devices via port forwarding. For replication to occur through NAT translated devices, all replication traffic must be within a VPN Supported WAN Links
  • 24. 24 • VRA Default MTU = 1492 • VRA Default Sockets = 8 • Minimum 5Mbps dedicated bandwidth • WAN Compression • VPN/Firewall • MPLS • Network Filters • Note - VRAs engage in PMTU discovery VRA Network Performance Considerations
  • 25. 25 • zPerf – Test for effective available bandwidth between the VRAs and maximum TCP socket allocation • zCPerf – Designed for a cloud scheme, which runs from the ZCC * Scripts are currently only available to Zerto support. • iPerf - Can be used to measure the available bandwidth between the ZVMs. • Zerto WAN Sizing Tool • Understand your write workload! VRA Network Support Tools
  • 26. 26 Miscellaneous & Useful Tools • Notepad++ - Free, available and versatile. • Bare Tail – See logs live with keyword highlighting and tabs. • Cmder – Multi terminal console for Windows that includes Bash commands (grep, less, etc...) and Git integration. • Wireshark – Network analysis and trace tool. All of these tools save time and manual work, making it easier for us to focus on the problem.
  • 28. 28 Zerto PowerShell CMDlets - Getting Started In order to get started with Zerto’s PowerShell CMDlets, you will first need to download the relevant Zerto PowerShell CMDlets installer. Running it will install the Zerto module on that VM, (Does not have to be the ZVM VM but has to have network access to it) After the installation, we need to import the Zerto Snap-In into PowerShell: powershell.exe -NoExit -Command Add-PSSnapIn Zerto.PS.Commands
  • 29. 29 Loading the CMDlets SnapIn Automatically Indeed, there is a way to load the Zerto SnapIn, each time you start PowerShell. This can be achieved using the following method: Add the SnapIn command to the powershell.exe path by adding the following line into the PowerShell shortcut (right-click, properties, shortcut): "powershell.exe -NoExit -Command Add-PSSnapIn Zerto.PS.Commands" - remember to add it after the powershell.exe. Like so: powershell.exe {HERE}
  • 30. 30 Loading the CMDlets SnapIn Example
  • 31. 31 Zerto CMDlets Example We’ll use ForceRemove-ProtectionGroup for this example: (Each step prompts for a user input) VirtualProtectionGroup: VPG name (Case sensitive!) ZVMIP: If you are running this from the ZVM, you can use localhost ZVMPort: Always 9080 Username: administrator (explanation on credentials slide) Password: password (explanation on credentials slide) Are you sure you want to perform this action? [Y] Yes [A] Yes to All [N] No [L] No to All [S] Suspend [?] Help (default is "Y"): This identifier is the task ID sent to the ZVM – essentially meaning it was successful
  • 32. 32 Zerto CMDlets One Liner The previous example showed an interactive PowerShell session where the user had to input answers/information for each step. You can run almost all CMDlets using a one line command, for example: ForceRemove-ProtectionGroup –ZVMIP localhost –ZVMPort 9080 –Username administrator –Password password –VirtualProtectionGroup ‘Test’ – Confirm:$false
  • 33. 33 Zerto CMDlets Help The most important part of all, is that you can type: help cmdlet-name and get a full argument and flags review of that cmdlet. Example: help ForceRemove-ProtectionGroup This will allow you to understand what exact argument you should provide to the cmdlet. Not all are mandatory.
  • 34. 34 Zerto PowerShell CMDlets - Credentials The user given in Zerto’s PowerShell CMDlets, is NOT the vCenter or ZVM user. These are separate credentials, stored in a text file at C:Program FilesZertoZerto Virtual Replicationusers.txt In this file, there is the user administrator, and a hash of a string, to represent the password, which is by default “password”
  • 35. 35 Zerto PowerShell CMDlets - Credentials You can create different users and passwords, but passwords will always have to be hashed. There are many ways to hash a string (http://www.sha1-online.com/), as many as there are to “un-hash” it. In the ZVR installation folder: ‘Users.txt’ the username and password combination, appears as so: administrator 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8 (separated by tab [just click the Tab button on the keyboard]) Any other credentials, should be listed exactly the same, with the username first, Tab , and the password
  • 38. 38