SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
VMware vSphere
Replication 5.5
Overview

®

Simple and Effective Virtual Machine Protection
TEC H N I C A L W H ITE PA P E R
VMware vSphere Replication 5.5 Overview

Table of Contents
Introduction.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
What Is vSphere Replication? .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 3
How Does It Work? .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 5
Simplicity Without Sacrificing Functionality.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 7
Recovering a Virtual Machine  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 10
. .
Retention of Multiple Points in Time.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 11
Next Steps .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
Protect Your Virtual Machines from Loss and Downtime
with vSphere Replication  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
. .
Additional Documentation .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
VMware Contact Information.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
Providing Feedback.  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13
About the Author .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  .  . 13

TECH N I C AL WH ITE PAPE R / 2
VMware vSphere Replication 5.5 Overview

Introduction
A fundamental part of protecting IT is ensuring that the services provided by virtual machines are resilient and
robust at all levels of the compute stack, from hardware through to the application.
VMware vSphere® Replication is a feature of the VMware vSphere platform. It is designed to augment the
recovery capabilities of the vSphere platform by providing a built-in ability to continually replicate a running
virtual machine to another location. vSphere Replication creates a copy of a virtual machine that can be
stored locally within a cluster or at another site, providing a data source for rapidly restoring a virtual machine
within minutes.
vSphere Replication augments offerings in the vSphere availability protection matrix. It provides a solution
that enhances business continuity planning, complementing both backup and full disaster recovery, without
introducing the complexity and cost of a complete storage array–based replication configuration.
vSphere Replication enables configuring replication on a per–virtual machine basis and significantly rounds
out the capabilities of protection offered by vSphere.
This paper will help users understand what VMware vSphere Replication is, explain some of the benefits of its
features, and provide an overview of how it works to protect virtual machines against failure.

What Is vSphere Replication?
vSphere Replication is a feature of the VMware vSphere platform. It copies a virtual machine to another
location, within or between clusters, and makes that copy available for restoration through the
VMware vSphere Web Client or through the orchestration of a full disaster recovery product such as
VMware® vCenter™ Site Recovery Manager™.
vSphere Replication protects the virtual machine on an ongoing basis. It replicates to the copy only the changes
that are made to the virtual machine. This ensures that the virtual machine remains protected and is available for
recovery directly from the vSphere Web Client without requiring use of an external tool.
vSphere Replication is provided as a no-charge component of all eligible vSphere licenses, ranging from
VMware vSphere Essentials Plus Kit to VMware vSphere Enterprise Plus Edition™. As with backups through
VMware vSphere Data Protection™, protecting a virtual machine is a critical function of a hypervisor platform
for the datacenter.
Unified management of vSphere Replication is offered via the next-generation vSphere Web Client. This
provides a common and unified screen for all aspects of virtual datacenter management, including many
aspects of protection such as replication, backup and restore.
Some replication technologies provide mere copies of a virtual machine at a remote site without any
consideration for the consistency of the application data within the virtual machine. vSphere Replication can be
configured to ensure consistent application data, along with virtual machine data, with one simple click when
configuring a virtual machine for replication.

TECH N I C AL WH ITE PAPE R / 3
VMware vSphere Replication 5.5 Overview

Figure 1. Integrated with the vSphere Web Client

Automatic integration with Microsoft Volume Shadow Copy Service (VSS) ensures that applications such as
Microsoft Exchange Server and Microsoft SQL Server databases are quiescent and consistent when replica data
is being generated. A quick call to the virtual machine’s VSS layer flushes any outstanding application writes to
ensure that the data that is replicated is static and fully recoverable.

Figure 2. Application Consistency via VSS

There are no application agents or administration required for this process. Application consistency is inherent
to the copies made by vSphere Replication and is achieved through communication with the Microsoft Windows
operating system (OS) via the installed VMware Tools™.
vSphere Replication also enables administrators to choose retention of historical replications as potential points
in time to revert a recovered system. When configuring replication for a virtual machine, administrators simply
select whether or not to retain multiple points in time; they then can choose how many historical copies are to
be retained and for how many days. They can retain a maximum of 24 points in time and can customize the
retention configuration. For example, a user might choose to retain one copy daily for as many as 24 days,
24 copies throughout a day for only one day, or any other selection that their requirements might dictate.

TECH N I C AL WH ITE PAPE R / 4
VMware vSphere Replication 5.5 Overview

How Does It Work?
vSphere Replication is a deeply integrated component of the vSphere platform. It is the only true
“hypervisor-level” replication engine available today. Changed blocks in the virtual machine disk(s) for a
running virtual machine are sent to a secondary location, where they are received by a virtual appliance that
writes them to an on-disk redo log. Only when that redo log is complete and all blocks in a given replication
are received is that set of data applied to the virtual machine disks for the offline (protection) copy of the
virtual machine.

VM

VM

VM

VM

VM

Figure 3. Replicate Virtual Machines’ Changed Blocks

vSphere Replication consists of an agent that is a part of the core vSphere 5.5 installation package on each host,
along with a set of virtual appliances that are deployed from the management interface. From a conceptual
perspective, the agent is responsible for both tracking and sending changed data from a running virtual
machine; the remote appliance receives the replication and applies it to the offline disk files for the virtual
machine. The vSphere Replication appliance also manages replication, which enables the administrator to see
the virtual machines’ protection status and to recover them with a few simple actions.
Configuring replication for as many as 500 virtual machines through the same management interface that is
used for all VMware vCenter™ operations is an easy process of right-clicking a virtual machine and selecting the
destination for its replica.
Part of this process is to select a recovery point objective (RPO), which provides information to
vSphere Replication regarding an age limit for the copy of the virtual machine. The RPO determines how
“stale” the data at the recovery location is allowed to be. If a virtual machine must be recovered, it will be
at worst only as old as its configured RPO. vSphere Replication attempts to replicate data to meet the RPO
at all times, ensuring that the virtual machine data is never older than the defined policy for each virtual
machine configured for replication. In many cases, vSphere Replication has data that is actually newer than
the configured RPO, because it will intelligently move individual replications forward in time to alleviate
forecasted potential bandwidth bottlenecks that it determines based on historical traffic patterns.

Figure 4. Selecting an RPO for Multiple Virtual Machines

TECH N I C AL WH ITE PAPE R / 5
VMware vSphere Replication 5.5 Overview

vSphere Replication performs an initial, full synchronization of the source virtual machine and its replica copy.
If wanted, a seed copy of data can be placed at the destination to reduce the time and bandwidth required for
the initial replication. A seed copy of a virtual machine consists of a clone of the original virtual machine disk file,
which can be placed at the target location via a variety of mechanisms. Seeding is not a necessary process, and
vSphere Replication creates an initial copy at the target location whether or not a seed is present. If a user
provides a seed for replication, the contained data is used to reduce the amount of replication required to initially
synchronize the primary disk and its replica. A seed can be created manually or can be cloned and put into place
by any mechanism the administrator chooses, such as offline copying, FTP, “sneakernet,” or even using an ISO or
a clone of a virtual machine, provided that the disk UUID of the seed is the same as that of the original system
being copied.
After baseline synchronization is complete, vSphere Replication switches to transferring only the blocks of data
that have changed. The vSphere kernel itself tracks unique writes to the disk files of protected virtual machines
and identifies and replicates only those blocks that have experienced unique writes during the configured RPO.
This ensures that a minimal amount of data is sent over the network to the target, and it enables aggressive
RPOs. After unique data has been sent, there is no need that it be sent again. Only changes are replicated, and
those blocks are sent to the target location’s vSphere Replication Appliance.

Protected VMs
VM1
VM1
VM1

vCenter

Replica Location

VR
Appliance

vSphere

VR Agent

VM3

Network
File Copy

vSphere

VR Agent

vCenter

VR
Appliance

Changed
Blocks

vSphere

Storage
VMDK1 VMDK2

Network
File Copy

vSphere

Storage
VMDK1

VMDK2

Figure 5. Data Flow of Replication from vSphere Agent to vSphere Replication Appliance

At the target location, the data is received and checked within the vSphere Replication Appliance. Only fully
consistent data is then written (via Network File Copy) to the redo log at the target cluster’s vSphere hosts; only
when the redo log is complete and all expected data has been received will it thereby be written to disk. This
manner of waiting for a completely consistent block group ensures recoverability of the replica virtual machine
at all times, even if data is lost during transit or a crash occurs at any point during the transfer.
From the perspective of the protected virtual machine, this entire process is completely transparent and requires
no changes to configuration or ongoing management. The replication is nonintrusive, irrespective of the OS
within the virtual machine.

TECH N I C AL WH ITE PAPE R / 6
VMware vSphere Replication 5.5 Overview

Simplicity Without Sacrificing Functionality
vSphere Replication is inherently a lightweight replication protocol. By replicating only changed blocks on an
ongoing basis, network bandwidth can be saved and commit times for data are minimized.
The vSphere Replication framework consists of a vSphere Replication appliance that is paired with a single
vCenter Server system. This appliance provides the management framework for vSphere Replication and also
acts as the target for replicated blocks. Increased scale or the presence of multiple remote sites can lead to the
choice of deploying up to nine additional vSphere Replication server virtual appliances, which are deployed in
exactly the same fashion as the original vSphere Replication appliance. By contrast, however, they function
strictly as a destination target for replication and enable simple scaling and distribution of the replication
framework. They do not participate in the management of vSphere Replication; they exist strictly to enable
various topologies and for traffic separation purposes.
With vSphere Replication 5.5, users can choose to replicate to a number of different locations: to another site
with both a vCenter Server system and a vSphere Replication appliance; to another site with only a vSphere
Replication server, within a datacenter to another location on disk; or to any combination they choose. A user
might even choose to replicate between two remote offices that have only a vSphere Replication server
deployed and do not have a vCenter Server system or a vSphere Replication appliance, as long as they are
managed from a central location that does have those objects. As many as 500 virtual machine replications can
be managed with an individual vSphere Replication appliance instance, irrespective of the topologies chosen.

Protected Site

VR Server

vSphere Client
VR
Appliance

vSphere

Target Site 1

NFC

vCenter Server
VMDK2

Storage

vSphere
VRA

VR Server

vSphere

Target Site 2

NFC
VMDK1 VMDK2

Storage

VMDK2

Storage

Figure 6. Framework for Replication with Multiple Sites and vSphere Replication Servers – One Datacenter Replicating to Two Remote Sites

Within this framework, RPOs for each virtual machine can be defined, ranging from 15 minutes to 24 hours. This
RPO can be changed on demand without interruption, enabling administrators to fine-tune replication based on
dynamic factors such as change rates, bandwidth availability and so on.

TECH N I C AL WH ITE PAPE R / 7
VMware vSphere Replication 5.5 Overview

Multiple Sites – Single vCenter

Site 1

Site 2

Site 3

VR
Appliance

vSphere

VR
Appliance

vSphere

VR
Appliance

vSphere

vCenter
Server

VR
Appliance

Replication
Direction

vSphere
vCenter
Server

Site 4
Main Datacenter – Single vCenter

Sample Replication Topologies
Figure 7. Further Possible Options Include Replicating Between Multiple Remote Sites Managed by Different vCenter Server System Instances

Because the RPO is unique to each virtual machine, more-critical virtual machines can be given a more
aggressive replication target than others. Groups of virtual machines, however, can be selected en masse to
enable large-scale changes. Each disk within a virtual machine can be independently configured to be replicated
or not replicated, offering further opportunity to save bandwidth and time for recovery. For instance, a database
server might consist of multiple disks, one of which is dedicated to a temporary scratch location. This disk is not
required for replication. Likewise, sometimes a swap file or paging file is redirected to a dedicated disk that
might also be excluded from replication to save bandwidth for transient data.

TECH N I C AL WH ITE PAPE R / 8
VMware vSphere Replication 5.5 Overview

Figure 8. Replication Is a Policy of the Virtual Machine

The replicated disks are independent of format, layout and snapshots of the primary copy. For example, a virtual
machine disk file that is thick provisioned on a Fibre Channel SAN at the primary location can be thin provisioned
to local disk for recovery, if so chosen. vSphere Replication eliminates the requirement that replication have
identical storage hardware. Likewise, because the virtual machine replica is “cold booted” when recovery takes
place, there is no need that server hardware be identical if replicating between clusters.

Figure 9. Selecting Properties for Replication of a Virtual Machine, Including Retention of Point-in-Time Instances

At its core, vSphere Replication enables policy-driven protection of systems—because the configuration of an
object’s replication is attached as a property of the virtual machine itself—while also enabling virtual machines
to continue operating without any change, overhead or interruption.
The tracking mechanism that identifies changed blocks of a virtual machine resides above the storage layer,
enabling replication that is fully independent of disk location, disk format, thin- or thick-provisioned disks, and
whether or not snapshots are in use by the virtual machine.

TECH N I C AL WH ITE PAPE R / 9
VMware vSphere Replication 5.5 Overview

Recovering a Virtual Machine
Recovery of a virtual machine can be necessitated for a number of reasons, including testing, impending
outages, and even disaster recovery. vSphere Replication is designed to enable administrators to manually
recover an individual machine with a few clicks in the vSphere Web Client.
It is not the goal of vSphere Replication to provide complex orchestration of disaster recovery in the manner
of vCenter Site Recovery Manager. Instead, vSphere Replication offers replication on a per–virtual machine
basis to enable fine-grained recovery configurations for environments that require them. If wanted, however,
vSphere Replication can act as the replication engine for vCenter Site Recovery Manager, with no extra
configuration or special considerations for setup. vCenter Site Recovery Manager can recognize machines that
are protected with vSphere Replication and can “inherit” their protection.

Figure 10. Recover a Virtual Machine by Right-Clicking Its Replication Status

With vSphere Replication, recovery of a virtual machine can be started easily by one of three methods. After
navigating to replication Status in the vSphere Replication area of the vSphere Web Client, the administrator
first selects the virtual machine to be recovered. A recovery action can be initiated by right-clicking, clicking the
recovery icon, and selecting Recover from the Actions drop-down menu.
The replica cannot be powered on and recovered if the original virtual machine is still reachable and is still
powered on. To continue the recovery process, the primary copy of the virtual machine must be unreachable by
vCenter Server or powered off. The next step is to choose a destination for the virtual machine—a folder to hold
it and a cluster or resource pool in which it will be powered on. A method of recovery can be chosen, including
whether to synchronize the most recent changes, if the protected virtual machine is available. If, however, the
protected system is not available or is in an undesirable state, the user can alternately proceed to recover the
virtual machine using the last good replication and not synchronize the most recent changes.

TECH N I C AL WH ITE PAPE R / 1 0
VMware vSphere Replication 5.5 Overview

Figure 11. Recovery of a Virtual Machine Is Complete

After these items are selected, recovery will begin. This process creates a powered-on copy of the virtual
machine connected to the replica disk, but it does not connect any of the virtual network cards to any port
groups. This can help prevent situations where the same virtual machine might be active on the network in two
locations simultaneously, as well as broadcast collision and routing issues involving duplicates. After the virtual
machine is fully booted, the administrator reviews the recovery and status of the booted replica and simply
attaches the virtual machine to the appropriate networks to complete the recovery.

Retention of Multiple Points in Time
vSphere Replication 5.5 introduced the option to retain historical points in time for recovery. As described earlier
in this document, this policy is selected when replication is configured for a virtual machine.

Figure 12. Select Point-in-Time Retention as a Policy of Replication

TECH N I C AL WH ITE PAPE R / 11
VMware vSphere Replication 5.5 Overview

If a virtual machine has been replicated and historical point-in-time retention was chosen, the administrator
has the ability to revert the virtual machine to one of the earlier replicas. The points in time are represented as
virtual machine snapshots that can be browsed using the VMware vSphere Client™ Snapshot Manager.
The point-in-time snapshots are labeled with the date stamp of the moment at which they were created.
The administrator chooses a snapshot to use and can either revert to that point in time or delete one or
more snapshots.

Figure 13. After Recovering a Virtual Machine with Preserved Points in Time, Use the Snapshot Manager to Revert to an Earlier Point

Recovery of a virtual machine is a simple process that can be accomplished in a safe and reliable fashion with a
few clicks in the GUI.

TECH N I C AL WH ITE PAPE R / 12
VMware vSphere Replication 5.5 Overview

Next Steps
Protect Your Virtual Machines from Loss and Downtime with vSphere Replication
Make vSphere Replication a part of your vSphere 5.5 deployment and improve your virtual machine availability
without introducing risk. Register today for a trial of vSphere and enjoy the benefits of replication of your critical
virtual machines as an integrated part of your IT platform.

Additional Documentation
For more information about vSphere, visit the product pages at
http://www.vmware.com/products/vSphere.
The following links are to online vSphere and vCenter Server documents:
•	Product documentation
•	VMware knowledge base

VMware Contact Information
For additional information or to purchase VMware vSphere 5.1, the VMware global network of solution
providers is ready to assist. If you want to contact VMware directly, you can reach a sales representative at
1-877-4VMWARE (650-475-5000 outside North America) or email sales@vmware.com. When emailing, include
the state, country, and company name from which you are inquiring.

Providing Feedback
VMware appreciates your feedback on the material included in this guide and in particular would be grateful for
any guidance on the following topics:
How useful was the information in this guide?
What other specific topics would you like to see covered?
Please send your feedback to docfeedback@vmware.com, with “vSphere Replication 5.5 Overview” in the
subject line. Thank you for your help in making this guide a valuable resource.

About the Author
Ken Werneburg is a senior technical marketing manager at VMware. He works on business continuity and
disaster recovery solutions in the Cloud and Infrastructure Management group. Ken has been with VMware
since 2006.
•	Follow Ken’s blogs at http://blogs.vmware.com/vsphere/uptime.
•	Follow Ken on Twitter: @vmKen.

TECH N I C AL WH ITE PAPE R / 13
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed
at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be
trademarks of their respective companies. Item No: VMW-TWP-vSPHR-REP-5.5-OVERVW-USLET-101	
Docsource: OIC-13VM004.04

Mais conteúdo relacionado

Mais procurados

Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6David Pérez Moriche
 
Virtualization
VirtualizationVirtualization
Virtualizationvishnurk
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentationvirtualsouthwest
 
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptx
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptxvmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptx
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptxVitNguyn252054
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 
IT Automation with Ansible
IT Automation with AnsibleIT Automation with Ansible
IT Automation with AnsibleRayed Alrashed
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e DesignVMUG IT
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareDuncan Epping
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Duncan Epping
 
z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS ResolverzOSCommserver
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technologysanjoysanyal
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare WorkstationHitesh Gupta
 

Mais procurados (20)

Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6Virtualización de Servidores con VMware vSphere 6
Virtualización de Servidores con VMware vSphere 6
 
Virtualization
VirtualizationVirtualization
Virtualization
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
VMware Virtual SAN Presentation
VMware Virtual SAN PresentationVMware Virtual SAN Presentation
VMware Virtual SAN Presentation
 
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptx
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptxvmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptx
vmware_cloud_foundation_on_vxrail_technical_customer_presentation.pptx
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
IT Automation with Ansible
IT Automation with AnsibleIT Automation with Ansible
IT Automation with Ansible
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
VSAN – Architettura e Design
VSAN – Architettura e DesignVSAN – Architettura e Design
VSAN – Architettura e Design
 
Virtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure softwareVirtual SAN 6.2, hyper-converged infrastructure software
Virtual SAN 6.2, hyper-converged infrastructure software
 
virtual machine.ppt
virtual machine.pptvirtual machine.ppt
virtual machine.ppt
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
 
Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015Five common customer use cases for Virtual SAN - VMworld US / 2015
Five common customer use cases for Virtual SAN - VMworld US / 2015
 
z/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolverz/OS Communications Server: z/OS Resolver
z/OS Communications Server: z/OS Resolver
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
VMware vSphere
VMware vSphereVMware vSphere
VMware vSphere
 
Bsd ppt
Bsd pptBsd ppt
Bsd ppt
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
Hypervisors
HypervisorsHypervisors
Hypervisors
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 

Destaque

VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practicesthephuck
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld
 
Andrew dalman withnarrative
Andrew dalman withnarrativeAndrew dalman withnarrative
Andrew dalman withnarrativeKongfuPanda3
 
Professional etiquette short version
Professional etiquette short versionProfessional etiquette short version
Professional etiquette short versionBobby Khatana
 
AIA home loan application form
AIA home loan application formAIA home loan application form
AIA home loan application formAndrea Loh
 
Kelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupKelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupNanda Reda
 
Training powerpoint mha
Training powerpoint mhaTraining powerpoint mha
Training powerpoint mhaThereseS
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530Firman Indrianto
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippaWork Aholic
 
The eight-parts-of-speech
The eight-parts-of-speechThe eight-parts-of-speech
The eight-parts-of-speechImran Ali
 
Հետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինՀետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինnarineharutyunyan
 
Khairani muslim
Khairani muslimKhairani muslim
Khairani muslimNanda Reda
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhFirman Indrianto
 

Destaque (19)

VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best PracticesVMware Site Recovery Manager - Architecting a DR Solution - Best Practices
VMware Site Recovery Manager - Architecting a DR Solution - Best Practices
 
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
VMworld 2013: Protection for All - VMware vSphere Replication & SRM Technical...
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
 
Enchilada recipe
Enchilada recipeEnchilada recipe
Enchilada recipe
 
Andrew dalman withnarrative
Andrew dalman withnarrativeAndrew dalman withnarrative
Andrew dalman withnarrative
 
Personalidad ingles
Personalidad inglesPersonalidad ingles
Personalidad ingles
 
Professional etiquette short version
Professional etiquette short versionProfessional etiquette short version
Professional etiquette short version
 
AIA home loan application form
AIA home loan application formAIA home loan application form
AIA home loan application form
 
Karen
KarenKaren
Karen
 
PKM B.inggris
PKM B.inggrisPKM B.inggris
PKM B.inggris
 
Kelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidupKelompok 12 perkembangan makhluk hidup
Kelompok 12 perkembangan makhluk hidup
 
Training powerpoint mha
Training powerpoint mhaTraining powerpoint mha
Training powerpoint mha
 
Membangun bisnis hosting ipi90530
Membangun bisnis hosting   ipi90530Membangun bisnis hosting   ipi90530
Membangun bisnis hosting ipi90530
 
Hot materials hippa
Hot materials hippaHot materials hippa
Hot materials hippa
 
The eight-parts-of-speech
The eight-parts-of-speechThe eight-parts-of-speech
The eight-parts-of-speech
 
Cv danar
Cv danarCv danar
Cv danar
 
Հետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասինՀետաքրքիր փաստեր գետերի մասին
Հետաքրքիր փաստեր գետերի մասին
 
Khairani muslim
Khairani muslimKhairani muslim
Khairani muslim
 
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluhE book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
E book-bermain-dengan-infrastruktur-virtual-v mware-v-sphere-tulisan-kesepuluh
 

Semelhante a V mware v-sphere-replication-overview

What's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageWhat's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageVMware
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...EMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage EMC
 
consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...Itzik Reich
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...EMC
 
V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5ssuser4f1d93
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...EMC
 
Mastering VMware Snapshot
Mastering VMware SnapshotMastering VMware Snapshot
Mastering VMware SnapshotMohammed Raffic
 
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...EMC
 
Why Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationWhy Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationVMware
 
V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609Banking at Ho Chi Minh city
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualizationIBM India Smarter Computing
 
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments   Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments EMC
 
Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]gerdev
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313EMC
 
DDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideDDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideJuniper Networks
 
V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]gerdev
 

Semelhante a V mware v-sphere-replication-overview (20)

What's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - StorageWhat's New in VMware vSphere 5.0 - Storage
What's New in VMware vSphere 5.0 - Storage
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
Backup and Recovery Solution for VMware vSphere on EMC Isilon Storage
 
consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...consolidating and protecting virtualized enterprise environments with Dell EM...
consolidating and protecting virtualized enterprise environments with Dell EM...
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
White Paper: Using VMware Storage APIs for Array Integration with EMC Symmetr...
 
V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5V mware v sphere install & configure manage v6.5
V mware v sphere install & configure manage v6.5
 
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
Reference Architecture: EMC Infrastructure for VMware View 5.1 EMC VNX Series...
 
Mastering VMware Snapshot
Mastering VMware SnapshotMastering VMware Snapshot
Mastering VMware Snapshot
 
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
White Paper: Storage Tiering for VMware Environments Deployed on EMC Symmetri...
 
Why Choose VMware for Server Virtualization
Why Choose VMware for Server VirtualizationWhy Choose VMware for Server Virtualization
Why Choose VMware for Server Virtualization
 
V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609V mware implementation with ibm system storage ds4000 ds5000 redp4609
V mware implementation with ibm system storage ds4000 ds5000 redp4609
 
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
VMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualizationVMware vSphere 5 and  IBM XIV Gen3 end-to-end  virtualization
VMware vSphere 5 and IBM XIV Gen3 end-to-end virtualization
 
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments   Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
Techbook : Using EMC Symmetrix Storage in VMware vSphere Environments
 
Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]Wp br v7_a_vmware_architects_favorite_features[1]
Wp br v7_a_vmware_architects_favorite_features[1]
 
Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313Pivotal gem fire_twp_distributed-main-memory-platform_042313
Pivotal gem fire_twp_distributed-main-memory-platform_042313
 
Db2 virtualization
Db2 virtualizationDb2 virtualization
Db2 virtualization
 
DDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation GuideDDoS Secure: VMware Virtual Edition Installation Guide
DDoS Secure: VMware Virtual Edition Installation Guide
 
V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]V sphere 5-upgrade-best-practices-guide[1]
V sphere 5-upgrade-best-practices-guide[1]
 

Mais de Firman Indrianto

Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-briefFirman Indrianto
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideFirman Indrianto
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVRFirman Indrianto
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guideFirman Indrianto
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challengeFirman Indrianto
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyFirman Indrianto
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini referenceFirman Indrianto
 

Mais de Firman Indrianto (10)

Tutorial c panel
Tutorial c panelTutorial c panel
Tutorial c panel
 
Managed cloud-transition-service-brief
Managed cloud-transition-service-briefManaged cloud-transition-service-brief
Managed cloud-transition-service-brief
 
Cloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguideCloud stack3.0.0 3.0.2quickinstallguide
Cloud stack3.0.0 3.0.2quickinstallguide
 
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 Manual cms ( central management system ) / Video Viewer for AVTECH DVR Manual cms ( central management system ) / Video Viewer for AVTECH DVR
Manual cms ( central management system ) / Video Viewer for AVTECH DVR
 
V mware v center converter standalone user's guide
V mware v center converter standalone user's guideV mware v center converter standalone user's guide
V mware v center converter standalone user's guide
 
Uhf regulations
Uhf regulationsUhf regulations
Uhf regulations
 
The rfid tagging_challenge
The rfid tagging_challengeThe rfid tagging_challenge
The rfid tagging_challenge
 
Materi workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedyMateri workshop-instalasi mikrotik pc router with speedy
Materi workshop-instalasi mikrotik pc router with speedy
 
Wirelessconnect
WirelessconnectWirelessconnect
Wirelessconnect
 
Thinapp47 packageini reference
Thinapp47 packageini referenceThinapp47 packageini reference
Thinapp47 packageini reference
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

V mware v-sphere-replication-overview

  • 1. VMware vSphere Replication 5.5 Overview ® Simple and Effective Virtual Machine Protection TEC H N I C A L W H ITE PA P E R
  • 2. VMware vSphere Replication 5.5 Overview Table of Contents Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 What Is vSphere Replication? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 How Does It Work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Simplicity Without Sacrificing Functionality. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Recovering a Virtual Machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 . . Retention of Multiple Points in Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Next Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Protect Your Virtual Machines from Loss and Downtime with vSphere Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 . . Additional Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 VMware Contact Information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Providing Feedback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 About the Author . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 TECH N I C AL WH ITE PAPE R / 2
  • 3. VMware vSphere Replication 5.5 Overview Introduction A fundamental part of protecting IT is ensuring that the services provided by virtual machines are resilient and robust at all levels of the compute stack, from hardware through to the application. VMware vSphere® Replication is a feature of the VMware vSphere platform. It is designed to augment the recovery capabilities of the vSphere platform by providing a built-in ability to continually replicate a running virtual machine to another location. vSphere Replication creates a copy of a virtual machine that can be stored locally within a cluster or at another site, providing a data source for rapidly restoring a virtual machine within minutes. vSphere Replication augments offerings in the vSphere availability protection matrix. It provides a solution that enhances business continuity planning, complementing both backup and full disaster recovery, without introducing the complexity and cost of a complete storage array–based replication configuration. vSphere Replication enables configuring replication on a per–virtual machine basis and significantly rounds out the capabilities of protection offered by vSphere. This paper will help users understand what VMware vSphere Replication is, explain some of the benefits of its features, and provide an overview of how it works to protect virtual machines against failure. What Is vSphere Replication? vSphere Replication is a feature of the VMware vSphere platform. It copies a virtual machine to another location, within or between clusters, and makes that copy available for restoration through the VMware vSphere Web Client or through the orchestration of a full disaster recovery product such as VMware® vCenter™ Site Recovery Manager™. vSphere Replication protects the virtual machine on an ongoing basis. It replicates to the copy only the changes that are made to the virtual machine. This ensures that the virtual machine remains protected and is available for recovery directly from the vSphere Web Client without requiring use of an external tool. vSphere Replication is provided as a no-charge component of all eligible vSphere licenses, ranging from VMware vSphere Essentials Plus Kit to VMware vSphere Enterprise Plus Edition™. As with backups through VMware vSphere Data Protection™, protecting a virtual machine is a critical function of a hypervisor platform for the datacenter. Unified management of vSphere Replication is offered via the next-generation vSphere Web Client. This provides a common and unified screen for all aspects of virtual datacenter management, including many aspects of protection such as replication, backup and restore. Some replication technologies provide mere copies of a virtual machine at a remote site without any consideration for the consistency of the application data within the virtual machine. vSphere Replication can be configured to ensure consistent application data, along with virtual machine data, with one simple click when configuring a virtual machine for replication. TECH N I C AL WH ITE PAPE R / 3
  • 4. VMware vSphere Replication 5.5 Overview Figure 1. Integrated with the vSphere Web Client Automatic integration with Microsoft Volume Shadow Copy Service (VSS) ensures that applications such as Microsoft Exchange Server and Microsoft SQL Server databases are quiescent and consistent when replica data is being generated. A quick call to the virtual machine’s VSS layer flushes any outstanding application writes to ensure that the data that is replicated is static and fully recoverable. Figure 2. Application Consistency via VSS There are no application agents or administration required for this process. Application consistency is inherent to the copies made by vSphere Replication and is achieved through communication with the Microsoft Windows operating system (OS) via the installed VMware Tools™. vSphere Replication also enables administrators to choose retention of historical replications as potential points in time to revert a recovered system. When configuring replication for a virtual machine, administrators simply select whether or not to retain multiple points in time; they then can choose how many historical copies are to be retained and for how many days. They can retain a maximum of 24 points in time and can customize the retention configuration. For example, a user might choose to retain one copy daily for as many as 24 days, 24 copies throughout a day for only one day, or any other selection that their requirements might dictate. TECH N I C AL WH ITE PAPE R / 4
  • 5. VMware vSphere Replication 5.5 Overview How Does It Work? vSphere Replication is a deeply integrated component of the vSphere platform. It is the only true “hypervisor-level” replication engine available today. Changed blocks in the virtual machine disk(s) for a running virtual machine are sent to a secondary location, where they are received by a virtual appliance that writes them to an on-disk redo log. Only when that redo log is complete and all blocks in a given replication are received is that set of data applied to the virtual machine disks for the offline (protection) copy of the virtual machine. VM VM VM VM VM Figure 3. Replicate Virtual Machines’ Changed Blocks vSphere Replication consists of an agent that is a part of the core vSphere 5.5 installation package on each host, along with a set of virtual appliances that are deployed from the management interface. From a conceptual perspective, the agent is responsible for both tracking and sending changed data from a running virtual machine; the remote appliance receives the replication and applies it to the offline disk files for the virtual machine. The vSphere Replication appliance also manages replication, which enables the administrator to see the virtual machines’ protection status and to recover them with a few simple actions. Configuring replication for as many as 500 virtual machines through the same management interface that is used for all VMware vCenter™ operations is an easy process of right-clicking a virtual machine and selecting the destination for its replica. Part of this process is to select a recovery point objective (RPO), which provides information to vSphere Replication regarding an age limit for the copy of the virtual machine. The RPO determines how “stale” the data at the recovery location is allowed to be. If a virtual machine must be recovered, it will be at worst only as old as its configured RPO. vSphere Replication attempts to replicate data to meet the RPO at all times, ensuring that the virtual machine data is never older than the defined policy for each virtual machine configured for replication. In many cases, vSphere Replication has data that is actually newer than the configured RPO, because it will intelligently move individual replications forward in time to alleviate forecasted potential bandwidth bottlenecks that it determines based on historical traffic patterns. Figure 4. Selecting an RPO for Multiple Virtual Machines TECH N I C AL WH ITE PAPE R / 5
  • 6. VMware vSphere Replication 5.5 Overview vSphere Replication performs an initial, full synchronization of the source virtual machine and its replica copy. If wanted, a seed copy of data can be placed at the destination to reduce the time and bandwidth required for the initial replication. A seed copy of a virtual machine consists of a clone of the original virtual machine disk file, which can be placed at the target location via a variety of mechanisms. Seeding is not a necessary process, and vSphere Replication creates an initial copy at the target location whether or not a seed is present. If a user provides a seed for replication, the contained data is used to reduce the amount of replication required to initially synchronize the primary disk and its replica. A seed can be created manually or can be cloned and put into place by any mechanism the administrator chooses, such as offline copying, FTP, “sneakernet,” or even using an ISO or a clone of a virtual machine, provided that the disk UUID of the seed is the same as that of the original system being copied. After baseline synchronization is complete, vSphere Replication switches to transferring only the blocks of data that have changed. The vSphere kernel itself tracks unique writes to the disk files of protected virtual machines and identifies and replicates only those blocks that have experienced unique writes during the configured RPO. This ensures that a minimal amount of data is sent over the network to the target, and it enables aggressive RPOs. After unique data has been sent, there is no need that it be sent again. Only changes are replicated, and those blocks are sent to the target location’s vSphere Replication Appliance. Protected VMs VM1 VM1 VM1 vCenter Replica Location VR Appliance vSphere VR Agent VM3 Network File Copy vSphere VR Agent vCenter VR Appliance Changed Blocks vSphere Storage VMDK1 VMDK2 Network File Copy vSphere Storage VMDK1 VMDK2 Figure 5. Data Flow of Replication from vSphere Agent to vSphere Replication Appliance At the target location, the data is received and checked within the vSphere Replication Appliance. Only fully consistent data is then written (via Network File Copy) to the redo log at the target cluster’s vSphere hosts; only when the redo log is complete and all expected data has been received will it thereby be written to disk. This manner of waiting for a completely consistent block group ensures recoverability of the replica virtual machine at all times, even if data is lost during transit or a crash occurs at any point during the transfer. From the perspective of the protected virtual machine, this entire process is completely transparent and requires no changes to configuration or ongoing management. The replication is nonintrusive, irrespective of the OS within the virtual machine. TECH N I C AL WH ITE PAPE R / 6
  • 7. VMware vSphere Replication 5.5 Overview Simplicity Without Sacrificing Functionality vSphere Replication is inherently a lightweight replication protocol. By replicating only changed blocks on an ongoing basis, network bandwidth can be saved and commit times for data are minimized. The vSphere Replication framework consists of a vSphere Replication appliance that is paired with a single vCenter Server system. This appliance provides the management framework for vSphere Replication and also acts as the target for replicated blocks. Increased scale or the presence of multiple remote sites can lead to the choice of deploying up to nine additional vSphere Replication server virtual appliances, which are deployed in exactly the same fashion as the original vSphere Replication appliance. By contrast, however, they function strictly as a destination target for replication and enable simple scaling and distribution of the replication framework. They do not participate in the management of vSphere Replication; they exist strictly to enable various topologies and for traffic separation purposes. With vSphere Replication 5.5, users can choose to replicate to a number of different locations: to another site with both a vCenter Server system and a vSphere Replication appliance; to another site with only a vSphere Replication server, within a datacenter to another location on disk; or to any combination they choose. A user might even choose to replicate between two remote offices that have only a vSphere Replication server deployed and do not have a vCenter Server system or a vSphere Replication appliance, as long as they are managed from a central location that does have those objects. As many as 500 virtual machine replications can be managed with an individual vSphere Replication appliance instance, irrespective of the topologies chosen. Protected Site VR Server vSphere Client VR Appliance vSphere Target Site 1 NFC vCenter Server VMDK2 Storage vSphere VRA VR Server vSphere Target Site 2 NFC VMDK1 VMDK2 Storage VMDK2 Storage Figure 6. Framework for Replication with Multiple Sites and vSphere Replication Servers – One Datacenter Replicating to Two Remote Sites Within this framework, RPOs for each virtual machine can be defined, ranging from 15 minutes to 24 hours. This RPO can be changed on demand without interruption, enabling administrators to fine-tune replication based on dynamic factors such as change rates, bandwidth availability and so on. TECH N I C AL WH ITE PAPE R / 7
  • 8. VMware vSphere Replication 5.5 Overview Multiple Sites – Single vCenter Site 1 Site 2 Site 3 VR Appliance vSphere VR Appliance vSphere VR Appliance vSphere vCenter Server VR Appliance Replication Direction vSphere vCenter Server Site 4 Main Datacenter – Single vCenter Sample Replication Topologies Figure 7. Further Possible Options Include Replicating Between Multiple Remote Sites Managed by Different vCenter Server System Instances Because the RPO is unique to each virtual machine, more-critical virtual machines can be given a more aggressive replication target than others. Groups of virtual machines, however, can be selected en masse to enable large-scale changes. Each disk within a virtual machine can be independently configured to be replicated or not replicated, offering further opportunity to save bandwidth and time for recovery. For instance, a database server might consist of multiple disks, one of which is dedicated to a temporary scratch location. This disk is not required for replication. Likewise, sometimes a swap file or paging file is redirected to a dedicated disk that might also be excluded from replication to save bandwidth for transient data. TECH N I C AL WH ITE PAPE R / 8
  • 9. VMware vSphere Replication 5.5 Overview Figure 8. Replication Is a Policy of the Virtual Machine The replicated disks are independent of format, layout and snapshots of the primary copy. For example, a virtual machine disk file that is thick provisioned on a Fibre Channel SAN at the primary location can be thin provisioned to local disk for recovery, if so chosen. vSphere Replication eliminates the requirement that replication have identical storage hardware. Likewise, because the virtual machine replica is “cold booted” when recovery takes place, there is no need that server hardware be identical if replicating between clusters. Figure 9. Selecting Properties for Replication of a Virtual Machine, Including Retention of Point-in-Time Instances At its core, vSphere Replication enables policy-driven protection of systems—because the configuration of an object’s replication is attached as a property of the virtual machine itself—while also enabling virtual machines to continue operating without any change, overhead or interruption. The tracking mechanism that identifies changed blocks of a virtual machine resides above the storage layer, enabling replication that is fully independent of disk location, disk format, thin- or thick-provisioned disks, and whether or not snapshots are in use by the virtual machine. TECH N I C AL WH ITE PAPE R / 9
  • 10. VMware vSphere Replication 5.5 Overview Recovering a Virtual Machine Recovery of a virtual machine can be necessitated for a number of reasons, including testing, impending outages, and even disaster recovery. vSphere Replication is designed to enable administrators to manually recover an individual machine with a few clicks in the vSphere Web Client. It is not the goal of vSphere Replication to provide complex orchestration of disaster recovery in the manner of vCenter Site Recovery Manager. Instead, vSphere Replication offers replication on a per–virtual machine basis to enable fine-grained recovery configurations for environments that require them. If wanted, however, vSphere Replication can act as the replication engine for vCenter Site Recovery Manager, with no extra configuration or special considerations for setup. vCenter Site Recovery Manager can recognize machines that are protected with vSphere Replication and can “inherit” their protection. Figure 10. Recover a Virtual Machine by Right-Clicking Its Replication Status With vSphere Replication, recovery of a virtual machine can be started easily by one of three methods. After navigating to replication Status in the vSphere Replication area of the vSphere Web Client, the administrator first selects the virtual machine to be recovered. A recovery action can be initiated by right-clicking, clicking the recovery icon, and selecting Recover from the Actions drop-down menu. The replica cannot be powered on and recovered if the original virtual machine is still reachable and is still powered on. To continue the recovery process, the primary copy of the virtual machine must be unreachable by vCenter Server or powered off. The next step is to choose a destination for the virtual machine—a folder to hold it and a cluster or resource pool in which it will be powered on. A method of recovery can be chosen, including whether to synchronize the most recent changes, if the protected virtual machine is available. If, however, the protected system is not available or is in an undesirable state, the user can alternately proceed to recover the virtual machine using the last good replication and not synchronize the most recent changes. TECH N I C AL WH ITE PAPE R / 1 0
  • 11. VMware vSphere Replication 5.5 Overview Figure 11. Recovery of a Virtual Machine Is Complete After these items are selected, recovery will begin. This process creates a powered-on copy of the virtual machine connected to the replica disk, but it does not connect any of the virtual network cards to any port groups. This can help prevent situations where the same virtual machine might be active on the network in two locations simultaneously, as well as broadcast collision and routing issues involving duplicates. After the virtual machine is fully booted, the administrator reviews the recovery and status of the booted replica and simply attaches the virtual machine to the appropriate networks to complete the recovery. Retention of Multiple Points in Time vSphere Replication 5.5 introduced the option to retain historical points in time for recovery. As described earlier in this document, this policy is selected when replication is configured for a virtual machine. Figure 12. Select Point-in-Time Retention as a Policy of Replication TECH N I C AL WH ITE PAPE R / 11
  • 12. VMware vSphere Replication 5.5 Overview If a virtual machine has been replicated and historical point-in-time retention was chosen, the administrator has the ability to revert the virtual machine to one of the earlier replicas. The points in time are represented as virtual machine snapshots that can be browsed using the VMware vSphere Client™ Snapshot Manager. The point-in-time snapshots are labeled with the date stamp of the moment at which they were created. The administrator chooses a snapshot to use and can either revert to that point in time or delete one or more snapshots. Figure 13. After Recovering a Virtual Machine with Preserved Points in Time, Use the Snapshot Manager to Revert to an Earlier Point Recovery of a virtual machine is a simple process that can be accomplished in a safe and reliable fashion with a few clicks in the GUI. TECH N I C AL WH ITE PAPE R / 12
  • 13. VMware vSphere Replication 5.5 Overview Next Steps Protect Your Virtual Machines from Loss and Downtime with vSphere Replication Make vSphere Replication a part of your vSphere 5.5 deployment and improve your virtual machine availability without introducing risk. Register today for a trial of vSphere and enjoy the benefits of replication of your critical virtual machines as an integrated part of your IT platform. Additional Documentation For more information about vSphere, visit the product pages at http://www.vmware.com/products/vSphere. The following links are to online vSphere and vCenter Server documents: • Product documentation • VMware knowledge base VMware Contact Information For additional information or to purchase VMware vSphere 5.1, the VMware global network of solution providers is ready to assist. If you want to contact VMware directly, you can reach a sales representative at 1-877-4VMWARE (650-475-5000 outside North America) or email sales@vmware.com. When emailing, include the state, country, and company name from which you are inquiring. Providing Feedback VMware appreciates your feedback on the material included in this guide and in particular would be grateful for any guidance on the following topics: How useful was the information in this guide? What other specific topics would you like to see covered? Please send your feedback to docfeedback@vmware.com, with “vSphere Replication 5.5 Overview” in the subject line. Thank you for your help in making this guide a valuable resource. About the Author Ken Werneburg is a senior technical marketing manager at VMware. He works on business continuity and disaster recovery solutions in the Cloud and Infrastructure Management group. Ken has been with VMware since 2006. • Follow Ken’s blogs at http://blogs.vmware.com/vsphere/uptime. • Follow Ken on Twitter: @vmKen. TECH N I C AL WH ITE PAPE R / 13
  • 14. VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at http://www.vmware.com/go/patents. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-TWP-vSPHR-REP-5.5-OVERVW-USLET-101 Docsource: OIC-13VM004.04