Zerto Virtual Manager VSphere Administration Guide
Zerto Virtual Manager VSphere Administration Guide
Zerto Virtual Manager VSphere Administration Guide
Manager
Administration
Guide
VMware vSphere Environment
Version 7.0
The scripts are provided by example only and are not supported under any Zerto support program or service.
All examples and scripts are provided "as-is" without warranty of any kind. The author and Zerto further disclaim all implied warranties including, without
limitation, any implied warranties of merchantability or of fitness for a particular purpose.
In no event shall Zerto, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever
(including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of
the use of or inability to use the sample scripts or documentation, even if the author or Zerto has been advised of the possibility of such damages. The entire
risk arising out of the use or performance of the sample scripts and documentation remains with you.
2
TABLE OF CONTENTS
3
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Requirements for Microsoft Azure Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
VPGs Recovering to Azure Standard Storage and Premium Managed Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Converting Premium Virtual Machines for Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Protecting From a vCenter Server - To a Microsoft Azure Recovery Site. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
4
Example Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
Exporting and Importing VPG Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
VPG Statuses and Synchronization Triggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
VPG Statuses. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
VPG Synchronization Triggers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
Managing Protection When the Recovery Datastore Will Be Unavailable (Datastore Maintenance) . . . . . . . . . . . . . . . . . . . . . . 266
5
CHAPTER 15: TESTING RECOVERY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
The Test Failover Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
Starting and Stopping Failover Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
What Happens After Starting a Test?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Viewing Test Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Live Disaster Recovery Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
Basic Verification – User Traffic Is Not Run against the Recovered VMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
Run User Traffic Against the Recovered VMs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
6
CHAPTER 22: ZERTO REPORTS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Outbound Protection Over Time Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Protection Over Time by Site Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .394
Recovery Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Resources Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Monthly Usage Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
VPG Performance Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
7
Configure and Install VRA Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .434
Configure Paired Site Routing Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Configure Provider vDCs Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .436
Configure VM Settings Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
Edit Volume Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .438
Edit NIC Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Edit Repository Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .445
Edit Selected Volumes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446
Edit VM Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .446
Edit VM Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .447
Edit VM Settings Dialog (AWS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .450
Edit VM Settings Dialog (Azure) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Edit vNIC Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Edit vNIC Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Edit Volumes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .454
Edit Volumes Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .459
Edit VRA Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .465
License Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .466
Manage Static Routes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .467
New Repository Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .468
Restore - Edit NICs Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .469
Offsite Clone Window. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .469
Open Support Case Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .470
Remote Support Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471
Restore a VPG from Repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472
Restore VPG - Volumes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Restore VPG - Edit Selected Volumes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
Site Settings Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478
Site Information Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .478
Performance and Throttling Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
Policies Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .482
Email Settings Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .483
Reports Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
Compatibility Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .484
Cloud Settings Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .485
LTR Settings Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .486
Stop Failover Test Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .486
TASKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .486
8
CHAPTER 1: INTRODUCTION TO
THE ZERTO SOLUTION
Disaster recovery is the process of preparing for recovery or continuation of IT processing tasks that support critical business
processes in the event of a threat to the IT infrastructure. Zerto’s Long Term Retention is the additional process of enabling
recovery of IT processing tasks after an extended period. This section describes Zerto general concepts to enable replication
and recovery in a virtual environment.
The following topics are described in this section:
■ “What is the Zerto Solution?”, below
■ “The Zerto Solution Architecture”, on page 10
■ “How Zerto Recovery Works”, on page 11
■ “Zerto Analytics - Overview”, on page 12
■ “Zerto Cloud Control - Overview”, on page 21
■ “Benefits of Using the Zerto Solution”, on page 23
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Introduction To The Zerto Solution 9
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Introduction To The Zerto Solution
workloads, whether through compliance, pricing or otherwise. Despite this, the cloud is not always the right option for all
workloads, and because of this, the traditional on-premises deployments with VMware vSphere or Microsoft Hyper-V are still
prevalent. Ultimately, having all of these options has led to increasing adoption of a multi-cloud and/or hybrid cloud strategy.
Organizations are challenged to ensure that workloads, whether in the cloud or on-premises, are not locked into any one
platform or vendor, and can be moved around based on where they fit best today, rather than yesterday. This is where
workload mobility comes in, removing the traditional lock-in to these platforms and allowing workloads to be moved across
platforms seamlessly, on-premises or in the cloud, including the ability to validate mobility prior to the live event without
production impact.
Zerto supports any-to-any mobility between VMware vSphere, Microsoft Hyper-V, AWS, IBM Cloud, Microsoft Azure and any
of our hundreds of Zerto-powered Cloud Service Providers (CSPs). For a full list of supported platforms and their versions
please see our Interoperability Matrix.
The following diagram shows how the main Zerto components are deployed across hypervisor-based enterprise sites to
provide disaster recovery across these sites.1
When you plan to recover the enterprise site to a public cloud, ZCA is installed in the cloud environment. ZCA comprises the
same components but the VRA runs as a service, so that the ZVM, VRA, and VBA all run as services on a single virtual machine
instance in the public cloud.
For the architecture diagrams when one of the sites is a cloud service provider, see the Zerto Cloud Manager Administration
Guide.
1. For the architecture diagrams when one of the sites is a cloud service provider, see Zerto Cloud Manager Administration Guide.
The VRA manages the journals for every virtual machine that will be recovered to the hypervisor hosting that VRA. It also
manages images of the protected volumes for these virtual machines. During a failover, you can specify that you want to
recover the virtual machines in the VPG using the last checkpoint or you can specify an earlier checkpoint, in which case the
recovery of the mirror images under the VRA are synchronized to this checkpoint. Thus, you can recover the environment to
the point before any corruption and ignore later writes in the journal that were corrupted, regardless of the cause of the
corruption, such as a crash in the protected site or a virus attack.
To improve the RTO during recovery, the user is able to start working even before the virtual machine volumes on the recovery
site have been fully synchronized. Every request is analyzed and the response returned either from the virtual machine directly
or from the journal if the information in the journal is more up-to-date. This continues until the recovery site virtual
environment is fully synchronized, up until the last checkpoint or an earlier checkpoint, when the integrity of the protected site
was assured.
When recovery to a point is required that is further in the past than the time saved in the journal, you can restore from files
created during the Retention process. Retention is an extension of disaster recovery, with the virtual machine files, such as the
configuration and virtual disk files, saved to a repository for up to one year. These files are then used to restore the virtual
machines to the point of the stored retention sets at the recovery site.
Use the What’s New and Help widgets in Zerto Analytics to learn more about each of the features available in
Zerto Analytics.
In addition to the Dashboard, there are additional views that provide details on the overall health of your environment.
■ Use the sites topology to identify sites without remote protection, to identify network issues and to identify cloud issues.
■ To handle any issues in the ZVM site, in the Dashboard tab > SITES area, click the icon Open ZVM in new tab. This routes
you to the specific ZVM site.
■ In the same Sites area, click the Menu button to navigate to the VPGs, Alerts or Tasks for the specified site.
To see active alerts, events or tasks from a specific ZVM, use the filter in the top left of the screen .
Events are displayed for the last 24 hours by default. Use the date selector to filter the Events List by date.
To view a history of alerts, select the Events tab and Alert History in the sub menu. Inactive alerts are displayed for the
selected time range.
TIP:
Click the Alert ID and Event ID to open the help and view the full details for that specific alert or event.
Troubleshooting VPGs
From the VPGs tab, review the list of VPGs with Errors and Warnings. In the VPGs status area, click either VPGs with Warnings
or VPGs with Errors to filter the VPGs list.
To review the status of a VPG, click in the column of the VPG you want to review to open the VPG Details page. From here you
can view the details of the virtual machines associated with the VPG as well.
If you want to view the details of another VPG, select the VPG from the VPGs drop-down list
TIP:
To further investigate about a selected VPG, click the VPG History button, and select to view either the RPO, Journal or
Network Reports page. (See Reviewing Reports for more details about Reports).
Reviewing Reports
The SaaS Analytics reports provide real-time and historical data analysis. ECE and CSP licenses can view up to 90 days of
report history. Use the date controller to filter your reports. Statistics are displayed according to the selected time frame.
TIP:
Zoom in to view more granular data by selecting and dragging your mouse over the selected time frame.
From the Reports tab, review the RPO, Journal and Network performance history on the VPGs.
Use the Network reports for reviewing the network history for any VPG or Site. You can also view the network summary for a
selected time frame, the network performance history and IOPs history.
Use the RPO reports for viewing a summary to see if RPO SLAs are being met, the RPO history and the RPO breach table for
viewing when the specific time breach occurred and the duration of the SLA breach.
Use the Journal reports for understanding if resilience is at risk due to journal storage capacity and plan for storage growth.
Using the ZORG filter, CSPs can see historical data and status for any individual customer.
Additionally, using the Zerto Analytics APIs, CSPs can create custom reports and automate reporting delivery of real-time
content to their customers. The APIs can also be used to provide content for customer portals.
KEY
Supported
Not Supported
* Supported partially,
see comments for
further details.
FEATURE ZVM V5.0 AND ZVM V5.5 AND ZVM V6.0 AND ZVM V6.5 AND ZVM V7.0 AND COMMENTS
ABOVE ABOVE ABOVE ABOVE ABOVE
Dashboard * Events are available
from v5.5U4 and
above.
VPG List --
VPG Details * Journal size data is
available from v5.5 and
above.
Monitoring: Alerts --
Monitoring: Tasks --
Monitoring: Events * Events are available
from v5.5U4 and
above.
Reports: RPO --
Reports: Journal * Journal size data is
available from v5.5 and
above.
Reports: Network --
Site List & Topology --
End-User (ZORG) * ZORG filter is available
Filter from v5.5u4 and above.
90 Days History for * * Journal size data is
ECE and Cloud available from v5.5 and
above.
Network reports are
available from v6.0.
Licensing Usage --
Storage Analytics * Storage Analytics is
Tab available from v6.5u2.
Storage Analytics for * Storage Analytics is
VPG Volumes available from v6.5u2.
Planning Zerto Resource Planner
is available from
v7.0U1.
This table outlines each piece of information that is collected and sent from the ZVM for Zerto Analytics.
Site
collectionTimeInUtc Time the ZVM data was collected.
documentVersion Version of the document.
hashedLicenseKey ZVM license hashed.
isTransmissionEnabled Whether transmission of data was enabled by the user.
sitename Name of the site.
protectedDataInMB Total data protected in the ZVM site.
siteIdentifier Internal site identifier.
transmitterCycleInSec Number of seconds between two (2) data transmissions.
type Site environment.
utcOffsetInMinutes Offset of the site time from UTC, in minutes.
version Zerto Virtual Manager version.
vpgsAlertsCount Number of active alerts in ZVM.
zorgsCount Number of ZORGs in the ZVM site.
zvmIp IP of the ZVM
VPGs
actualJournalHistoryInSeconds The actual journal history, in seconds.
actualRpoSeconds Time since the last checkpoint was written to the journal in
seconds.
configuredJournalHistoryInMinutes Configured journal history, in minutes.
configuredRpoSeconds Configured RPO, in seconds.
earliestRecoveryPointLocalDateInUtc Time of the earliest checkpoint in the journal.
priority Priority specified for the VPG.
protectedSite Protected site details (Site ID, Site Name, Site Type and ZVM
version).
recoverySite Recovery site details (Site ID, Site Name, SiteType and ZVM
version).
status Status of the VPG.
subStatus Substatus of the VPG.
vpgIdentifier Identifier of the VPG.
vpgName Name of the VPG.
zorgName Name of the Zerto organization set up in the Zerto Cloud
Manager, which uses this VPG.
VMS
IOPS IO per second between all the applications running on the virtual
machine in the VPG and the VRA, that sends a copy to the
remote site for replication.
journalHardLimit Maximum journal size in MBs, or in a percentage of the virtual
machine volume size.
journalWarningThreshold Journal size in MBs, or in a percentage of the virtual machine
volume size, that generates a warning when the journal is nearing
its hard limit.
outgoingBandWidthInMbps Bandwidth throttling defined for the virtual machines.
provisionedStorageMb The storage provisioned for the virtual machine in the recovery
site.
throughputInMB MBs of all the applications running on the virtual machine being
protected.
usedJournalStorageMb Storage used by the virtual machine at the recovery site for
Journals.
usedStorageMb Storage used by the virtual machine at the recovery site.
vpgName The name of the VPG, of which the VM is associated.
vmIdentifier ID of the VM.
vmName Name of the VM.
VRAs
vraName Name of the VRA.
vraVersion Version of the VRA.
Events
eventIdentifier The identifier of the event.
eventCategory Category of the event. (Possible values: VPG, VRA, Site).
eventType The type of event.
siteIdentifier The internal site identifier related to the event.
zorgIdentifier The identifier of the Zerto organization (ZORG), defined in the
Zerto Cloud Manager.
zorgName The name of the Zerto organization (ZORG) set up in the Zerto
Cloud Manager.
description The event description.
occurredOnInUTC The date the event occurred.
eventCode The event code.
eventCompletedSuccessfully Whether the event completed successfully or not.
ZORGs
zorgIdentifier The identifier of the Zerto organization (ZORG), defined in the
Zerto Cloud Manager.
zorgName The name of the Zerto organization (ZORG) set up in the Zerto
Cloud Manager.
Datastores
datastoreIdentifier The datastore identifier.
datastoreName The datastore name.
devices The datastore device.
type The datastore type.
capacityInBytes The datastore capacity.
usedInBytes The datastore usage. (Possible values: journal usage; scratch
usage; protected usage; recovery usage; appliance usage; other
non-Zerto usage)
Volumes
datastore The owning datastore.
isThisProvisioned Provision type.
owningVm The virtual machine on which the volume is attached.
path The volume path.
protectedVm The protected virtual machine to which the volume is related.
size The volumes used storage.
volumeType The volume type.
vpg The VPG to which the volume is related.
Planning
Metrics are WriteKBps - Hourly Avg. The hourly average data write rate.
collected for all VMs WriteIOPS - Hourly Avg. The hourly average IO count per second.
from the source site.
VM ID The virtual machine identifier.
Datacenter Name The datacenter name.
Datacenter ID The datacenter identifier.
Host Name The host name.
Host ID The host identifier.
Cluster ID The cluster identifier.
Cluster Name The cluster name.
Folder The VM folder.
Configured CPU The configured CPU.
Configured RAM The configured RAM.
Provisioned Size (GB) The provisioned storage .
Used Size (GB) The used storage.
Disk Count Number of virtual disks.
Use the Help widgets in Upgrade Manager to learn more about each of the features available in the Upgrade Manager.
Using Tenants
The Tenants feature allows Cloud Service Providers to register new and existing enterprise customers to the respective ZORG
for that customer. In the ZORG registration, the CSP selects the Product Type. The product type can include features such as
One-To-Many and Long Term Retention.
Use the Help widgets in Tenants to learn more about each of the features available in the Upgrade Manager.
Hardware Agnostic
Because the Zerto solution manages recovery of virtual machines and virtual disks only, it does not matter what hardware is
used in either the protected or recovery sites; it can be from the same vendor or different vendors. With the Zerto solution, the
logical storage is separated from the physical storage so that the vendor and actual type of storage hardware do not need to be
considered.
Zerto provides a workload mobility and protection layer providing seamless connectivity, portability, protection, orchestration,
and application encapsulation of workloads across clouds without vendor lock-in. High scale, mission critical applications, and
data are encapsulated, as well as features, specifications, and configurations, and can be seamlessly migrated across different
servers, storage, hypervisors, and clouds without any disruption to business services.
With Zerto, IT managers can choose the right infrastructure for the right use case for the right price. One application can
leverage several different environments for disaster recovery, bursting, production, retention, testing, and development. With
Zerto there is no vendor lock-in to a cloud, technology, or vendor. Any choice, any cloud, any technology, any price, any service
level is available in minutes for any workload.
Hypervisor Agnostic
Zerto runs both in VMware vCenter Server and Microsoft SCVMM. It is compatible with VMware hypervisor management
features, such as vMotion and Microsoft hypervisor management features, such as Live Migration.
Fully Scalable
Zerto enables defining software-only Virtual Replication Appliances (VRAs) on each hypervisor host to manage the replication
of virtual machines on that host. Increasing the number of hypervisor hosts is handled by defining a new VRA on each new
host. There is no need to install additional software to the hypervisor management tool, such as VMware vCenter Server or
Microsoft SCVMM, to handle additional hosts or virtual machines and no need to consider additional hardware acquisitions.
One-Click Migration
Application migrations can be resource intensive projects that take weeks of planning, execution, and downtime. With Zerto
migrations are greatly simplified and can be completed without extended outages or maintenance windows and across
different types of hardware and even different hypervisors, such as VMware ESXi or Microsoft Hyper-V. Migrations across
different versions within a type of hypervisor, such as from a VMware vCenter environment to a vCloud environment or even
cross hypervisor migration, such as migration from a vCenter environment to a Hyper-V environment is as easy as a migration
from one site to another using the same hypervisor infrastructure.
impact on the production site, since the processing is performed on the recovery site. The data copied for retention are fixed
points saved daily, weekly or monthly.
Note: Zerto recommends weekly retention sets.
Policy-based
In the protected site you define the virtual machines that you want to recover, either individually or as groups, as a virtual
protection group (VPG). The virtual machines that you include in the VPG can come from one or more hypervisor hosts. In this
way, you can protect applications that run on multiple virtual machines and disks as a single unit, in a single VPG.
Minimal RPO
The Zerto solution utilizes continuous data protection, sending a record of every write in the virtual protection group to the
recovery site. The transfer of this information is done over an optimized WAN asynchronously. If recovery is required, all the
data that was transferred to the recovery site is available resulting in recovery within the requested RPO.
DR Management Anywhere
With the Zerto solution everything is managed from a standalone browser-base user interface, enabling disaster recovery
management from anywhere using any device.
You manage the protection and replication of virtual machines in vSphere, between the protected and recovery sites, using the
Zerto User Interface. On first access to the user interface, you might have to add a security certificate to set up secure
communication. Zerto also provides a set of RESTful APIs and PowerShell cmdlets to enable incorporating some of the disaster
recovery functionality within scripts or programs.
You manage the protection and replication of virtual machines between the protected and recovery sites, using one of the
following:
■ The Zerto Virtual Manager Web Client.
■ The vSphere Web Client.
■ The vSphere Client console.
Note: For a list of supported browsers, see Interoperability Matrix for All Zerto Virtual Replication Versions.
Note: You must exclude the following folders from antivirus scanning:
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Accessing the Zerto User Interface 26
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Accessing the Zerto User Interface
4. If more than one plug-in is installed, click Zerto to display the Zerto user interface.
4. Continue to the end of the wizard. Click Yes when the Security Warning is displayed.
■ DASHBOARD: General information about the site, including the status of the VPGs being protected or recovered to the
site.
■ VPGs: All the VPGs from both the local and remote sites and provides summary details of each VPG.
■ VMs: All the protected virtual machines from both the local and remote sites and provides summary details of each virtual
machine.
■ SITES: Details of the paired sites. This tab lists all the paired sites to the local site and provides summary details of each
paired site.
■ SETUP: (On-Premise only) Details about VRAs, storage and repositories.
■ RETENTION STATUS: Details of the retention repository jobs either by VPG or virtual machine. This tab lists all the
defined retention sets and their statuses.
■ MONITORING: Details about the alerts, events and tasks for the site.
■ REPORTS: General reports.
There are a number of configuration tasks that you should do as part of the initial site configuration.
The following configuration topics are described in this chapter:
■ “Setting Up Role-based Access Control”, below
■ “Enabling Replication to the Same Site”, on page 32
■ “Sizing Considerations”, on page 34
NOTE:
To set up Long Term Retention, to monitor the repositories created for retention, and to restore VPGs from the
repositories, see Using Zerto’s Long Term Retention.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Initial Site Configuration 32
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Initial Site Configuration
Sizing Considerations
There are a number of sizing issues to consider when setting up your disaster recovery. Review the Zerto Scale and
Benchmarking Guidelines to see the sizing considerations.
Sizing Considerations 34
CHAPTER 4: OVERVIEW OF
RECOVERY FLOWS
The Zerto solution enables protecting virtual machines, for both disaster recovery or for extended, longer term recovery from a
retention repository, by protecting the relevant virtual machines in virtual protection groups. A virtual protection group (VPG)
is a group comprised of virtual machines that are grouped together for recovery purposes. For example, the virtual machines
that comprise an application like Microsoft Exchange, where one virtual machine is used for the software, one for the database,
and a third for the Web Server require that all three virtual machines be replicated to maintain data integrity.
Once a VPG has been created, each virtual machine in the VPG can be replicated on the recovery site under the VRA on the
host specified in the VPG definition as the host for the recovery of the virtual machine.
In addition to disaster recovery and recovery from retention, the Zerto solution enables recovery of individual files or folders
from a certain point of time.
The following are described in this section:
■ “What is Zerto’s Disaster Recovery Operation?”, below
■ “What is Zerto’s File or Folder Level Restore?”, on page 36
■ “What is Zerto’s Long Term Retention?”, on page 36
After initializing the VPG, all writes to the protected virtual machines are sent by the VRA on the relevant host for each virtual
machine on the protected site to the VRA on the recovery site specified as the recovery host for the virtual machine. The
information is saved in the journal for the virtual machine with a timestamp, ensuring write-fidelity. Every few seconds the
Zerto Virtual Manager causes a checkpoint to be written to every journal on the recovery site for every virtual machine in the
VPG, ensuring crash-consistency.
The data remains in the journal until the time specified for the journal when it is moved to the relevant mirror disks, also
managed by the VRA for the virtual machine. In this way, you can recover the virtual machines using the mirror disks and then
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Recovery Flows 35
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Recovery Flows
promoting the data from the journal to include the final few hours of data for each virtual machine. For more details about the
journal, see “The Role of the Journal During Protection”, on page 41.
The following references the operations to recover virtual machines which are protected in a VPG:
■ “Overview of Disaster Recovery Operations”, on page 320
■ “Managing Failover”, on page 345
■ “Migrating a VPG to a Recovery Site”, on page 335
■ “Cloning a VPG to the Recovery Site”, on page 355
NOTE:
If you need to extend the recovery ability to more than 30 days, Zerto provides Long Term Retention that enables saving the
protected data in a state where they can be easily deployed.
The data is saved in a repository for a defined retention period. Each VPG will have retention sets created according to the
configured schedule.
The retention process is managed by the ZVM, and the Data Streaming Service (DSS), which is installed in the VRA, performs
all the data path operations. During the retention process, the DSS communicates with the VRA on the recovery site. The
retention sets are restore points saved either daily, weekly, monthly or yearly in the repository. Before you can start a retention
process for VPGs, you must first create one or more repositories for the retention sets.
Configuring Long Term Retention is part of defining a VPG. To set up Long Term Retention to protect VPGs, see “Using Zerto’s
Long Term Retention”, on page 365.
The number of Daily, Weekly, Monthly and Yearly retention sets define the retention period. For example, keeping 84 Monthly
or 7 Yearly both result in a 7 year retention time.
This allows for full flexibility for users to define anything from a week to many years. There is no maximum to the configurable
number of Yearly retentions to keep, although Zerto recommend users to keep no more than 150 retention sets in total (all
types included). This means Zerto can keep up to 150 years of retention.
What does the Repository Contain?
The Repository contains retention sets, where each retention set has it’s own mapping file (DOM file).
How does the Long Term Retention process work?
36
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Recovery Flows
When Long Term Retention is first configured, and the first reading of the data has occurred, the retention set consists of:
■ All the data copied to the Repository.
When the second reading and any subsequent readings after a full retention of the data occurs, the retention set consists of:
■ All the data from the first reading, but not including any original data which was marked as changed during the second
reading.
■ The changed data from the second reading.
Each incremental retention set is independent of previous incremental and full retention sets, and gives a complete and total
picture of the data at the point in time of the reading.
What happens when the Retention Policy period is overdue?
Retention sets are kept for the retention period specified as part of the Retention Policy configuration. Once the retention
expires, the expired retention sets will be deleted from the Repositories.
37
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Recovery Flows
38
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Recovery Flows
What happens if only one volume is supported and another one is not?
Zerto indexes the supported volumes and skips the non-supported volumes one we don't except to log it exists and wasn't
supported.
What is the maximum number of entries that can be indexed on a single VM?
■ A VM with over 150 million entries (files or folders) cannot be indexed.
■ Rate of entries (files or folders) indexed in NTFS per second: 2000 files.
■ Rate of entries (files or folders) indexed in EXT per second: 1500 files.
How to estimate the size required for indexing?
Storing the index for 100 restore points (incremental or full) will consume between 5-10% roughly of the original VM size.
39
CHAPTER 5: INTRODUCTION TO
PROTECTING VIRTUAL MACHINES
Virtual machines are protected in virtual protection groups (VPG). A VPG is a group of virtual machines that you group
together for recovery purposes. For example, the virtual machines that comprise an application like Microsoft Exchange, where
one virtual machine is used for the software, one for the database, and a third for the Web Server require that all three virtual
machines be replicated to maintain data integrity.
Any virtual machine whose operating system is supported in both the protected site and recovery site can be protected in a
VPG.
Once a virtual machine is protected, all changes made on the machine are replicated in the remote site. The replicated virtual
machines in the remote site can be recovered to any point in time defined for the VPG or if a period further in the past is
required, a retention set can be restored.
When a VPG is created, a replica of each virtual machine disk in the VPG is created under a VRA on the recovery site. These
replica virtual disks must be populated with the data in the protected virtual machines, which is done by synchronizing the
protected virtual machines with the recovery site replicas. This synchronization between the protected site and remote site
takes time, depending on the size of the virtual machines.
After the initial synchronization completes, only the writes to disk from the virtual machines in the protected site are sent to
the remote site. These writes are stored by the VRA in the remote site in journals for a specified period, after which they are
promoted to the replica virtual disks managed by the VRA.
Any virtual machine that is supported by the hypervisor can be protected. When recovering to a different hypervisor, the
protected virtual machines must also be supported by the recovery hypervisors.
The following topics are described in this chapter:
■ “Configuring Virtual Protection Groups”, below
■ “The Role of the Journal During Protection”, on page 41
■ “What Happens After the VPG is Defined”, on page 43
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Introduction to Protecting Virtual Machines 40
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Introduction to Protecting Virtual Machines
You can protect a single virtual machine in several VPGs. A virtual machine can be in a maximum of three VPGs. VPGs that
contain the same virtual machine cannot be recovered to the same site.
Note: Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
The VPG definition consists of the following:
General: A name to identify the VPG and the priority to assign to the VPG.
Virtual Machines: The list of virtual machines being protected as well as the boot order and boot delay to apply to the virtual
protection groups during recovery.
Replication Settings: VPG replication settings, such as the recovery site, host and storage and the VPG SLA. SLA information
includes the default journal history settings and how often tests should be performed on the VPG. The defaults are applied to
every virtual machine in the VPG but can be overridden per virtual machine, as required.
Cloud service providers can group the VPG SLA properties together in a service profile. When a service profile is used, the VPG
SLA settings cannot be modified unless a Custom service profile is available.
Storage Settings: By default the storage used for the virtual machine definition is also used for the virtual machine data. This
storage can be overridden per virtual machine, as required.
Recovery Settings: Recovery details include the networks to use for recovered virtual machines and scripts that should be run
either at the start or end of a recovery operation.
NIC Settings: Specify the network details to use for the recovered virtual machines after a live or test failover or migration.
Retention Policy Settings: Specify the VPG’s retention properties, including the repository where the retention sets are saved.
You can protect most types of virtual machines running in a vCenter. However, you cannot protect virtual machines with IDE
devices. Also, protected virtual machine VMDK descriptor files should be default disk geometry settings. Both the disk
geometry and BIOS geometry are written in the descriptor file under ddb.geometry.sectors and ddb.geometry.biosSectors
respectively. If these values do not each equal 63 then there may be recovery issues unless you configure the VPG using
preseeded volumes.
During recovery, the virtual machines at the recovery site are created and the recovery disks for each virtual machine, managed
by the VRA, are attached to the recovered virtual machines.
Information in the journal is promoted to the virtual machines to bring them up to the date and time of the selected checkpoint.
To improve the RTO during recovery, the virtual machine can be used even before the journal data has been fully promoted.
Every request is analyzed and the response is returned from the virtual machine directly or, if the information in the journal is
more up-to-date, it comes from the journal.
This continues until the recovery site’s virtual environment is fully restored to the selected checkpoint.
Each protected virtual machine has its own dedicated journal, consisting of one or more volumes.
A dedicated journal enables journal data to be maintained, even when changing the host for the recovery.
The default storage used for a journal is the storage used for recovery of each virtual machine. Thus for example, if protected
virtual machines in a VPG are configured with different recovery storage, the journal data is by default stored for each virtual
machine on that virtual machine recovery storage.
The default storage used for a journal when protecting to a VMware vCloud Director is the storage with the most free space,
that has either been defined as journal storage for the provider vDC, in the Configure Provider vDCs dialog, or any storage that
is visible to the recovery host, even if the journal storage was not defined in the Configure Provider vDCs dialog.
The journals for the protected virtual machines are defined as part of the VPG definition and by default are defined to reside on
the same storage as the virtual machine. This can be overridden at the virtual machine and VPG levels as follows.
ALLOWS STORAGE NOTES
TIERING
Default Journal No The journal is located on the virtual machine recovery datastore.
By default, the recovery datastore for each virtual machine journal is the same as the
virtual machine recovery datastore.
Journal datastore No Specify a journal datastore for each virtual machine. All journals for the virtual
separate from VM machine are stored in this datastore.
datastore for each
VM
Journal datastore Yes Specify a journal datastore for each VPG. All journals for the virtual machines in the
for each VPG VPG are stored in this datastore.
Journal datastore Yes Enables the use of advanced settings such as storage IO controls etc., to provide
for multiple VPGs individualized service to customers by grouping VPGs by customer and assigning
each group to a specific storage.
This option is recommended for cloud service providers.
Journal Sizing
The journal space is always allocated on demand. The provisioned journal size initially allocated for a journal is 16GB. The
provisioned journal size is the current size of all the journal volumes.
If the journal grows to approximately 80% of the provisioned journal size or less than 6GB remains free, a new volume is added
to increase the journal size. Each new journal volume added is bigger than the previous volume. The journal size can increase
up until a specified hard limit. If the size of the journal is reduced in the VPG definition after new volumes have been added,
these volumes are not reduced and continue to be used if required. In this case, the journal size can be bigger than the set size
and the reduced journal size definition is not applied, except to ensure that no new volumes are created if the new journal size
is reached or exceeded.
The provisioned journal size reported in the Resources report can fluctuate considerably when new volumes are added or
removed.
When the amount of the journal used is approximately 50% of the provisioned journal size, the biggest unused journal volume
from the added volumes is marked for removal. This volume is then removed after the time equivalent to three times the
amount specified for the journal history, or twenty-four hours, whichever is more if it is still not used.
Note: With VMware vSphere, with VMFS datastores and when the VRA is on a host ESXi that is version 5.1 or higher, the
journal can also reclaim unused space on a volume. Unused space is not reclaimed when using NFS datastores or any datastore
with a ESXi host that is lower than version 5.1.
Reclaiming space on a volume does not change the provisioned journal size, which is the current size of all the journal volumes.
When a virtual machine journal comes close to a specified hard limit, Zerto starts to move data to the target disks. Once this
begins, the maintained history begins to decrease. If the journal history falls below 75% of the value specified for the journal
history, a warning alert is issued in the GUI. If the history falls below one hour, an error is issued. However, if the amount of
history defined is only one hour, an error is issued if it is less than 45 minutes.
The size of the datastore where the journal resides must have at least 30GB free, or have 15% free space, relative to the total
datastore space, whichever number of GBs is smaller.
If the available storage of the journal datastore falls below 30GB or 15% of the total datastore size:
■ The datastore itself is considered full.
■ An error alert is issued and all writes to the journal volumes that datastore storage are blocked.
■ Replication is halted, but history is not lost.
■ The RPO begins to steadily increase until additional datastore space is made available.
Examples:
■ For a large (2TB) datastore: 15% free space remaining = 307GB.
The ZVM would not consider the datastore full if 307GB of free space were remaining. 30GB free space remaining would
trigger an alert, as it is the smaller figure.
■ For a small (100GB) datastore: 15% free space free space remaining = 15GB.
The ZVM would not consider the datastore full if 30GB of free space were remaining. 15GB free space remaining would
trigger an alert, as it is the smaller figure.
Once synchronized, the VRA on the recovery site includes a complete copy of every virtual machine in the VPG. After
synchronization the virtual machines in the VPG are fully protected, meeting their SLA, and the delta changes to these virtual
machines are sent to the recovery site.
For details of the screen, see “Monitoring a Single VPG”, on page 221.
Recovery
After initializing the VPG, all writes to the protected virtual machines are sent by the VRA on the relevant host for each virtual
machine on the protected site to the VRA on the recovery site specified as the recovery host for the virtual machine. The
information is saved in the journal for the virtual machine with a timestamp, ensuring write-fidelity. Every few seconds the
Zerto Virtual Manager writes a checkpoint to every journal on the recovery site for every virtual machine in the VPG, ensuring
crash-consistency.
The data remains in the journal for the time defined by the journal history configuration, after which it is moved to the relevant
mirror disks for each virtual machine. Both the journal and the mirror disks are managed by the VRA.
When recovering, either a failover or move, or testing failover or cloning protected virtual machines in the recovery site, you
specify the checkpoint at which you want the recovered virtual machines to be recovered. The mirror disks and journal are used
to recover the virtual machines to this point-in-time.
Considerations
■ If one or both of the sites have vCloud Director installed, see “Protecting Virtual Machines to and From vCloud Director”,
on page 117.
■ You cannot protect virtual machines with IDE devices.
■ Any virtual machine that is supported by the hypervisor can be protected. When recovering to a different hypervisor, the
protected virtual machines must also be supported by the recovery hypervisor.
■ Zerto does not support protecting virtual machines that are connected to DVDs.
■ You cannot protect virtual machines with VMware Fault Tolerance.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Protecting Virtual Machines from a vCenter Server 45
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server
You can protect virtual machines to a recovery site vCenter Server. The procedure is the same whether you intend to protect
one virtual machine or multiple virtual machines.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 46
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
4. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these VMs in the VPG.
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ When using the Search field, you can use the wildcards; * or ?
Virtual machines that are not yet protected are displayed in the list. A VPG can include virtual machines that are not yet
protected and virtual machines that are already protected.
5. You can view protected virtual machines in the Advanced (One-to-Many) section, by clicking Select VMs.
The Select VMs dialog is displayed.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
In on-premise environments, protecting virtual machines in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
6. To define the boot order of the virtual machines in the VPG, click Define Boot Order, otherwise go to the next step.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 47
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five (5) virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
8. Click NEXT.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 48
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
9. Specify the Recovery Site. This is the site to which you want to recover the virtual machines. After specifying the recovery
site, additional fields are displayed including the host and datastore to use for replication.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
10. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
11. Host: The default cluster, resource pool or host in the recovery site that handles the replicated data. If the site is defined in
Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have been specified as a
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 49
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
resource in Zerto Cloud Manager. For details about Zerto Cloud Manager, refer to Zerto Cloud Manager Administration
Guide.
Note: If Zerto Cloud Manager is used, vSphere Standard edition cannot be used.
When a resource pool is specified, Zerto checks that the resource pool capacity is enough for any virtual machines
specified in the VPG.
All resource pool checks are made at the level of the VPG and do not take into account multiple VPGs using the same
resource pool. If the resource pool CPU resources are specified as unlimited, the actual limit is inherited from the parent
but if this inherited value is too small, failover, move, and failover test operations can fail, even without a warning alert
being issued by Zerto Virtual Manager.
Note: If a resource pool is specified and DRS is disabled for the site later on, all the resource pools are removed by VMware
and recovery will be to any one of the hosts in the recovery site with a VRA installed on it.
12. Datastore: The default datastore to use for recovered virtual machine files and for their data volumes. Every datastore for
the selected recovery host is included in the drop-down list. If a cluster or resource pool is selected for the host, only
datastores that are accessible by every host in the cluster or resource pool are displayed.
13. In the SLA area, you define the Service Level Agreement for which this VPG is associated.
■ When Zerto Cloud Manager is used, select the Service Profile to use.
The Service Profile determines the VPG SLA settings for the group. This applies predefined settings for the Journal
History, Target RPO Alert and the Test Reminder. These settings apply to every virtual machine in the group.
■ When a Custom service profile is available, the VPG SLA settings are editable, and the Advanced button becomes
available. When you change these settings, they apply to every virtual machine in the group.
14. Click ADVANCED. The Advanced Journal Settings dialog is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 50
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 51
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
In this dialog, you can edit the values of one or more of the virtual machines in the VPG.
18. To edit information in one field, click the field and update the information.
19. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM dialog is displayed.
Define as follows:
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 52
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 53
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 54
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
You can define Thin provisioning and Temp Data in this window, or you can alternatively define them when you separately
select and edit each VMs volume.
IMPORTANT:
Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in volume initial
synchronization.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 55
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 56
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 57
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 59
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 61
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
28. Select the default recovery settings. These are applied to every virtual machine in the VPG.
■ Failover/Move Network: The network to use during a failover or move operation in which the recovered virtual
machines will run.
■ Failover Test Network: The network to use when testing the failover of virtual machines in the recovery site. Zerto
recommends using a fenced-out network so as not to impact the production network at this site.
■ Recovery Folder: The folder to which the virtual machines are recovered.
Note: If the recovery site is a Cloud Service Provider site, it is not possible to select a recovery folder.
29. To specify a recovery folder for each virtual machine in the VPG, click VM SETTINGS.
The Advanced VM Recovery Settings window is displayed.
In this window, you can edit the values of one or more of the virtual machines in the VPG.
■ To edit information in one field, click the field and update the information.
30. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 62
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 63
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
The NICs step is displayed. In this step, you can specify the NIC details to use for the recovered virtual machines after a
failover, a test failover, or migration.
36. To edit information in one field, click the field and update the information.
37. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
38. Otherwise, go to step 40.
The Edit vNIC dialog is displayed.
Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
39. In each column, specify the following:
■ Network: The network to use for this virtual machine.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 64
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Create new MAC address?: Whether the Media Access Control address (MAC address) used on the protected site
should be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you
check this option, to create a new MAC address, and the current IP address is not specified, the protected virtual
machine static IP address might not be used for the recovered virtual machine.
■ Change vNIC IP Configuration?: Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is
only changed after recovery for virtual machines with VMware Tools running.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports Re-IPing.
■ To change the vNIC IP, in the Failover/Move or Test column, select Yes. If you select to use a static IP connection,
set the IP address, subnet mask, and default gateway.
■ Optionally, change the preferred and alternate DNS server IPs and the DNS suffix.
■ If you leave the DNS server and suffix entries empty, or select to use DHCP, the IP configuration and DNS server
configurations are assigned automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each
octet in the Default gateway field for the NICs with no default gateway.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
then after the virtual machine has started, it is automatically rebooted so that it starts up with the correct IP. If the
same network is used for both production and test failovers, Zerto recommends changing the IP address for the virtual
machines started for the test, so that there is no IP clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
Click OK.
40. Click NEXT.
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved.
41. By default, Long Term Retention is OFF. To keep this value, go to step 50.
42. Toggle Long Term Retention from OFF to ON.
The options on the screen become available.
Note: When a VPG is recovered to a Public Cloud, Long Term retention is not available.
43. Select the Target Repository from the drop-down list. This is the name of the Repository where the retention sets are
written. The Connection Type and Path of that Repository appear after selecting the Target Repository.
44. Select the VMs to index from the File System Indexing drop-down list. For details on file system indexing, see Configuring
File System Indexing.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 65
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
45. Run all retention processes at: The time to start the retention process.The time is shown in UTC and is according to the
Zerto Virtual Manager clock in the production site. All Daily, Weekly, Monthly or Yearly retentions will run at this time.
46. Daily and Monthly retentions are toggled ON by default and the default retention settings for Schedule, Type and Keep
For appear. By default, all retention processes are scheduled to run on the same day.
47. Toggle the Weekly or Yearly retentions from OFF to ON. The default retention settings for Schedule, Type and Keep For
appear. The retention setting Keep For is the length of time to keep the retention sets. For details of how this affects the
number of retention sets saved, see Storing Retention Sets.
Note: Daily or Weekly retentions must be configured. Weekly or Monthly retentions must be configured to Full.
48. If you do not want to use the default settings, click the edit icon next to each retention setting and configure the following:
SETTING & DESCRIPTION SELECT...
Daily
Click the edit icon. The Daily Retention window is displayed ■ Run at: The time set to run all retention processes.
This field cannot be edited from the Daily
Retention window.
■ Keep For: Define the number of days to keep the
Daily Retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 66
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site vCenter Server 67
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Protecting a Single Virtual Machine (Via the VMware Web Client or Client Console)
You can protect a virtual machine, which is not already included in a VPG, directly via the Zerto tab for the virtual machine in
vSphere Web Client or Client console. You are presented with the following options:
■ To add the virtual machine to an existing VPG. The virtual machine is added to the VPG, as described in “To protect a
single virtual machine via the vSphere Client console or Web Client:”, below.
■ To create a new VPG that you intend should only include one virtual machine, as described in “To protect a single virtual
machine:”, on page 70.
■ To create a VPG that includes the virtual machine, as described in “Protecting Virtual Machines from a vCenter Server”, on
page 45. When using the Zerto User Interface, use this procedure.
To protect a single virtual machine via the vSphere Client console or Web Client:
1. In the vSphere Web Client or Client console, select the Zerto tab for the virtual machine to be added.
2. Click ADD TO EXISTING VPG.
The Select VPG dialog is displayed.
Protecting a Single Virtual Machine (Via the VMware Web Client or Client Console) 69
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Protecting a Single Virtual Machine (Via the VMware Web Client or Client Console) 70
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host
You can protect virtual machines to recovery Hyper-V hosts. The procedure is the same whether you intend to protect one
virtual machine or multiple virtual machines.
When creating a VPG from a VMware vCenter Server environment to Hyper-V all recovery operations bring up the recovered
machines on Microsoft Hyper-V hosts in SCVMM.
When protecting virtual machines from a VMware vCenter Server environment to Hyper-V, the operating systems of the
protected machines must be supported by Hyper-V. Refer to Hyper-V documentation for the list of supported operating
systems. Also, virtual machine names cannot include any of the following special characters: *?:<>/|\".
Conversion considerations for a protected virtual machine in vSphere when it is recovered in Hyper-V:
■ A machine using BIOS is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine using EUFI is recovered in Hyper-V as a Generation 2 virtual machine.
■ A machine with a 32bit operating system is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine with a 64bit operating system is recovered in Hyper-V as either a Generation 1 or Generation 2 virtual machine,
dependent on the operating system support in Hyper-V.
■ The boot disk is ported to a disk on an IDE controller. The boot location is 0:0.
■ A virtual machine using up to 4 SCSI controllers is recovered as a virtual machine with 1 SCSI controller.
■ The virtual machine NICs are recovered with Hyper-V network adapters except for protected Windows 2003 virtual
machines which are recovered with Hyper-V legacy network adapters.
■ When VMware Tools is installed on the protected virtual machine running Windows Server 2012, Integration Services is
installed on the recovered virtual machine automatically.
■ RDM disks are replicated to Hyper-V vhd or vhdx disks, and not to Pass-through disks.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 71
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
The VMs step is displayed.
4. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these VMs in the VPG.
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ When using the Search field, you can use the wildcards; * or ?
Virtual machines that are not yet protected are displayed in the list. A VPG can include virtual machines that are not yet
protected and virtual machines that are already protected.
5. You can view protected virtual machines in the Advanced (One-to-Many) section, by clicking Select VMs.
The Select VMs dialog is displayed.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 72
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
In on-premise environments, protecting virtual machines in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
6. To define the boot order of the virtual machines in the VPG, click DEFINE BOOT ORDER, otherwise, go to the next step.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
In on-premise environments, protecting virtual machines in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 73
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
are started together and after 10 seconds the virtual machines in the Server group are started. After 100 seconds the
virtual machines in the Client group are started.
e) Click OK to save the boot order.
8. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
9. Specify the Hyper-V recovery site, and the default values to use for the replication to this site. This is the site to which you
want to recover the virtual machines. After specifying the Microsoft SCVMM recovery site, the host and storage on the
site to use for the replication can be specified.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
■ Host: The default cluster or host, in the recovery site that handles the replicated data.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 74
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Storage: The default storage volume to use for the recovered virtual machine files and for their data volumes. Every
storage for the recovery host is included in the drop-down list. If a cluster is selected for the host, only storage
accessible by every host in the cluster are displayed.
10. Optionally, change the VPG SLA settings, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
11. For additional journal-related fields, click Advanced.
The Advanced Journal Settings dialog is displayed.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 75
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 76
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
In this window, you can edit the values of one or more of the virtual machines in the VPG.
14. To edit information in one field, click the field and update the information.
15. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM dialog is displayed.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 77
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 78
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 79
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
■ Dynamic: Select this when the recovery volume is dynamic-provisioned.
■ Temp Data: If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the
recovery disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial
synchronization.
20. To edit storage information for one of the virtual machines’ volume location, first select the virtual machine, then click
EDIT SELECTED. The Edit Volumes window is displayed.
■ For Hyper-V recovery environments, the following window appears. For details, click here.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 80
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 81
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 83
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 85
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 86
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
The NICs step is displayed. In this step, you can specify the NIC details to use for the recovered virtual machines after a
failover, a test failover, or migration.
26. To edit information in one field, click the field and update the information.
27. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
28. Otherwise, go to step 31.
The Edit vNIC dialog is displayed.
Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
29. In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ Create new MAC address?: Whether the Media Access Control address (MAC address) used on the protected site
should be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 87
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
check this option, to create a new MAC address, and the current IP address is not specified, the protected virtual
machine static IP address might not be used for the recovered virtual machine.
■ Change vNIC IP Configuration: Whether or not to keep the default virtual NIC (vNIC) IP configuration. Configuration
is possible only when the guest operating system is defined in the hypervisor manager and Integration Services or
VMWare Tools are detected. The vNIC IP address is only changed after recovery for virtual machines with VMware
Tools and Microsoft Integration Services running.
To change the vNIC IP configuration, select Yes in the Failover/Move or Test column. If you select to use a statically-
assigned IP address, set the IP address, subnet mask, and default gateway. Optionally, change the preferred and alternate
DNS server IP addresses and the DNS suffix. If you leave the DNS server and suffix entries empty, or select to use DHCP,
the IP address and DNS server configurations are assigned automatically, to match the protected virtual machine. You can
change the DNS suffix.
If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each octet in
the Default gateway field for the NICs with no default gateway.
Note: During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP address than the
original IP address, after the virtual machine has started it is injected with the correct IP address. If the same network is
used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started for
the test, so that there is no IP address clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
30. Click OK.
31. Click NEXT.
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved. VPG retention extends the ability to recover virtual machines in a VPG going back one year.
32. By default, Long Term Retention is OFF. To keep this value, go to step 40.
33. Toggle Long Term Retention from OFF to ON.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 88
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 89
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server To a Recovery Site Hyper-V Host 90
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ When using either of the zImport methods, each volume is created with EBS disk of type io1 with maximum 1000 EBS
Provision IOPS allocated. EBS disk type can be changed post recovery without downtime, see the relevant for more
information see the relevant AWS documentation. The minimum disk size for io1 is 4GB.
■ The default Max EBS Provision IOPS quota in a region across all io1 disks is 40000 EBS Provision IOPS, meaning that
with 1000 EBS Provision IOPS per volume, the maximum possible number of volumes is 40. If the Max EBS Provision
IOPS quota is reached, the failover process will switch to using slower gp2 disks. An event will notify the user of this,
and recommend that the user contact AWS support to increase the Max EBS Provision IOPS quota.
■ EBS encryption is enabled by default.
■ Depending on the desired RTO during recovery operations, or when testing failover, the user can select an import method
per VPG or per virtual machine from the following options:
■ “Zerto Import for Data Volumes”, on page 92
■ “Zerto Import for All Volumes”, on page 92
■ “AWS Import”, on page 93
NOTE:
If you are recovering to C5/M5 instances, skip this step and go to step 2.
If you are running Windows 2012 or Windows 2016 on any of the following AWS instance types:
■ C3 ■ I2
■ C4 ■ R3
■ D2 ■ M4 (excluding M4.16xlarge)
a) Go to http://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/sriov-networking.html#enable-enhanced-
networking
b) Follow the instructions at the site for downloading and installing the Windows ENA Drivers.
2. When using C5/M5 instance types only, the following drivers need to installed:
a) Download ENA (Enhanced Network Adapter) from this link.
b) Extract and execute "InstallEna.ps1"
c) Download the NVMe driver from this link.
d) Extract and execute "Dpinst.exe"
NOTES:
C5/M5 instance types are supported with the Zerto Import for All Volumes import method only.
IMPORTANT:
When using this import method for Windows machines, ZertoTools for AWS needs to be run on the protected
Windows virtual machine in VMware before VPG creation. For more information, see ZertoTools for AWS.
AWS Import
This method uses a combination of the AWS import-instance and import-volume APIs for the boot and data volumes
respectively. This was the only method supported until version 5.5.
■ Each machine that you intend to protect must have at least 250MB free space. This is because AWS adds files to the
recovered machines during failover, move, test failover, and clone operations.
■ Protected boot volumes are recovered in EC2 as EBS disks with magnetic disk type. Virtual machines with disks that are
less than 1GB are recovered with disks of 1GB. Additional volumes might be created in the recovered instance, dependent
on the instance type used for the recovery. These volumes can be ignored.
■ Protected volumes are recovered in EC2 as EBS disks with magnetic disk type. Virtual machines with disks that are less
than 1GB are recovered with disks of 1GB. Additional volumes might be created in the recovered instance, dependent on
the instance type used for the recovery. These volumes can be ignored. Temporary disks may be created based on the
selected instance size.
■ The maximum protected data volume and boot disk size is 1TB.
The AWS ImportInstance API only supports single volume VMs. The boot volume of the protected virtual machine should not
be attached to any other volume to successfully boot. For more information, see http://docs.aws.amazon.com/AWSEC2/
latest/APIReference/API_ImportInstance.html
BEST PRACTICE:
It is recommended to install ZertoTools before VPG creation. This ensures that all checkpoints are valid when failing
over.
If you install ZertoTools after VPG creation, make sure you select a checkpoint after the installations are completed.
ZertoTools Requirements
■ ZertoTools supports the following operating systems:
■ Windows 2008R2
■ Windows 2012
■ Windows 2012R2
■ Windows 2016
■ Windows 2019* (Windows 2019 is supported only if using Zerto Import for All Volumes)
■ Run ZertoTools from C: Windows OS drive only.
■ .Net Framework 4.5 and up must be installed.
ZertoTools Limitations
■ When using the Zerto Import for All Volumes import method, ZertoTools should not be installed on machines with
Windows that are Domain Controllers.
When failing over machines with Windows 2012, 2012R2 and 2016 that are Domain Controllers, the Windows Citrix PV
drivers need to be downloaded manually on the protected machines.
To download and install Windows PV drivers:
a) Go to https://www.xenproject.org/downloads/windows-pv-drivers/winpv-drivers-81/winpv-drivers-820.html
b) Follow the instructions for downloading and installing all Windows PV drivers.
■ To failover Windows 2008R2 with Domain Controller, contact Zerto Support.
■ Failback for Windows machines with Domain Controller is not supported.
NOTE:
PV drivers should not be manually installed on protected VMs prior to failover. This will result in an unreachable
recovery instance in AWS after the failover completes.
IMPORTANT:
5. The script downloads the AWS PV driver and installs it upon failover on the AWS machine. If the AWS PV driver download
fails, manually download it from the following link
■ AWS PV driver version 7.4.6: https://s3.amazonaws.com/ec2-windows-drivers-downloads/AWSPV/7.4.6/
AWSPVDriver.zip
■ AWS PV driver version <Latest>: https://s3.amazonaws.com/ec2-windows-drivers-downloads/AWSPV/Latest/
AWSPVDriver.zip
NOTE:
If you need to download the PV driver manually, the zip file name AWSPVDRIVER should not be changed.
ZertoTools will also backup the VMtools to ensure re-IP works upon Failback to the protected VMware site.
When running ZertoTools, note the following:
■ A folder named ZertoTools is created on C:/ProgramData folder.
This folder must not be deleted.
■ Upon failover to AWS, the AWS PV driver update may force reboot of the recovered instances in AWS.
Downgrade Script
If you decide to install the latest AWS PV driver, you will need to downgrade it before failing back to vSphere.
IMPORTANT:
Your AWS machine will be disconnected for a few minutes upon execution of the batch files.
5. After a few minutes, connect to the AWS instance and verify that the AWS PV driver is version 7.4.6.
If you installed ZertoTools after VPG creation, wait for the next checkpoint to be created before performing failover.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
The VMs step is displayed.
4. Select the VMs that will be part of this VPG and click the arrow pointing right to include these VMs in the VPG.
■ When using the Search field, you can use the wildcards; * or ?
Virtual machines that are not yet protected are displayed in the list. A VPG can include virtual machines that are not yet
protected and virtual machines that are already protected.
5. You can view protected virtual machines in the Advanced (One-to-Many) section, by clicking Select VMs.
The Select VMs dialog is displayed.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
In on-premise environments, protecting virtual machines in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
6. To define the boot order of the virtual machines in the VPG, click Define Boot Order, otherwise go to the next step.
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five (5) virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set, as shown below.
9. Specify the recovery site.
■ Recovery Site: The site to which you want to recover the virtual machines. After specifying the recovery site, other
fields are displayed.
You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that site.
10. Optionally, change the default SLA values:
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Replication From a Protected Site vCenter Server to a Recovery Site AWS 100
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
■ Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert
is issued.
■ Test Reminder: The amount of time in months recommended between each test, where you test the integrity of the
VPG. A warning is issued if a test is not performed within this time frame.
11. Click NEXT.
The Storage step is displayed.
By default the storage used for the virtual machine definition is also used for the virtual machine data.
For each virtual machine in the VPG, Zerto displays its storage-related information.
Replication From a Protected Site vCenter Server to a Recovery Site AWS 101
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
The Recovery step is displayed. Recovery details include the networks, security group, instance family, and instance type
to use for failover, move, and testing failover, and whether scripts should run as part of the recovery process.
14. From the Import Method drop-down list, select an import method.
■ Zerto Import for data volumes (Faster): Uses the zImport method for data volumes only. This is the default setting
and usually has a faster RTO than AWS Import.
■ Zerto Import for all volumes (Fastest, Requires setup): This is usually the fastest import method and uses a zImport
VM for all volumes.
■ AWS Import: This was the only import method supported until version 5.5.
15. Then, select settings for Failover/Move Recovery and Failover Test:
IMPORTANT:
ZertoTools for AWS is required for protecting VMs running Windows operating system in VMware, while AWS is the
recovery site platform.
■ For for information about ZertoTools, see “ZertoTools for AWS”, on page 94.
■ For more information about Zerto Import Methods, see “Import Methods for AWS”, on page 91.
■ VPC Network: The virtual network dedicated to your AWS account. A security group and subnet must be assigned to
this VPC.
■ Subnet: The subnet for the VPC network.
■ When you select the import methods Zerto Import for data volumes (Faster), or Zerto Import for all volumes
(Fastest, Requires setup), only those subnets that are supported by the zImport method are displayed in the
drop-down list.
Other Subnets are grayed out and cannot be selected.
Replication From a Protected Site vCenter Server to a Recovery Site AWS 102
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
NOTE:
The zImport virtual machine must have access to the internet in order to access the S3 Bucket and the AMI in EC2. The
only network in the customer environment that is certain to have internet access is the network to which the ZCA is
connected.
If the import method is not AWS Import, then the user can select only subnets that are part of the same Availability
Zone as the one in which the ZCA resides. Other Subnets are disabled.
■ When you select the import methods AWS Import, all subnets are listed. A tool tip alert is displayed when the
user hovers over a subnet that is not supported.
NOTE:
If a subnet is chosen in a network that is not in the same Availability Zone as the one in which the ZCA resides, options
that utilize the zImport method will not be made available for selection.
■ Security Group: The AWS security to be associated with the virtual machines in this VPG.
■ Instance Family: The instance family from which to select the type. AWS instance families are optimized for different
types of applications. Choose the instance family appropriate for the application being protected in the VPG.
■ Instance Type: The instance type, within the instance family, to assign to recovered instances. Different types within
an instance family vary, for example in vCPU, RAM, and local storage size. Choose the instance type appropriate for
the application being protected in the VPG. The price per instance is related to the instance configuration.
■
Replication From a Protected Site vCenter Server to a Recovery Site AWS 103
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
The Advanced VM Settings window is displayed, which shows the recovery network settings for Failover/Move for virtual
machines in the VPG. You can see the recovery network settings for failover tests by selecting Test.
17. To edit information in one field, click the field and update the information.
18. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM Settings dialog is displayed.
19. Update the values for Import Method, VPC network, subnet, security group, instance family, instance type, and private IP
as necessary.
Note: Only private IPs specified for Windows machines are assigned during a recovery operation. For Linux machines, the
IP is assigned from the specified subnet range.
Clearing the values in the Private IP field results in an IP being automatically assigned from the subnet range during a
recovery operation.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
20. Click OK twice to return to the main page of the Recovery step.
21. To run pre and post recovery scripts, enter the name of the script to run in the Command to run text box. You can then
enter details about the script.
■ Pre-recovery Script: The information about a script that should run at the beginning of the recovery process.
■ Post-recovery Script: The information about a script that should run at the end of the recovery process.
Replication From a Protected Site vCenter Server to a Recovery Site AWS 104
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCenter Server to a Recovery Site AWS 105
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure
You can protect virtual machines to Microsoft Azure. The procedure is the same whether you intend to protect one virtual
machine or multiple virtual machines.
When creating a VPG from vCenter server to Azure the data is stored in a storage account and all replicated data from
protected virtual machines to Azure is encrypted in the storage account. All recovery operations bring up the recovered
machines in resource groups in Azure.
See also:
■ “Requirements for Microsoft Azure Environments”, on page 106
■ “VPGs Recovering to Azure Standard Storage and Premium Managed Disks”, on page 106
■ “Converting Premium Virtual Machines for Protection”, on page 106
■ “Protecting From a vCenter Server - To a Microsoft Azure Recovery Site”, on page 109
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 106
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
GLOSSARY:
Premium VM: A Premium VM is when the original VM has all its disks on Premium Managed storage.
Note: We do not support conversion of VMs with disks on Premium Storage account.
Standard VM: A Standard VM is a copy made of the Premium VM, where the disks are copied from Premium Managed
storage to the ZCA’s Standard Storage account.
IMPORTANT:
Note that running the Premium to Standard Conversion tool will cause your Premium VM to be powered off.
NOTE:
You can view argument examples within the Command Prompt window by entering the help argument (e.g. ‘-h’)
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 107
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
NOTE:
Do not perform any actions on the VMs that are converting until the conversion process is completed.
6. The information is parsed and the log files are printed and saved to the Premium to Standard Conversion tool folder. The
conversion process is performed for each VM sequentially. The following occurs:
■ The Premium VM is turned off (if necessary).
■ The VM’s volumes are copied into the Standard Storage account as defined in the Storage Account Name parameter.
The copy is done sequentially.
■ The Premium VM NICs are detached and receives a NIC with a single IP, regardless of its original NIC/IP
configuration.
■ A new VM is created in the Standard Storage account, with the identical NICs as defined in the original VM.
■ The name of the new VM is “<original_name>-Standard” with the new standard volumes attached to it.
7. Create a VPG with the new Standard Storage VMs to start protecting them. See Protecting From a Microsoft Azure Site - To a
Microsoft Azure Recovery Site.
NOTE:
Upon failing over the Standard VM, only one IP address is assigned to the recovered VM. Any additional network
configurations should be entered manually.
Undo Process
If there is a failure in one of the phases during the conversion process, the system will automatically rollback to the previous
state.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 108
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
If at least one volume cannot be copied, all volumes that have already been copied to the Standard VM are deleted. The
Premium VM is then powered on again (only if the VM was powered on in its original state).
In some cases the system won’t succeed to automatically rollback, for example, if the tool’s application crashes. You can open
the log entries to see which undo operations are left to execute. In this case, you need to manually rollback to the previous
state, as required at each stage, depending where the failure occurred.
To manually rollback:
1. Detach the NICs from the Standard VM and attach it to the powered down Premium VM.
2. Delete the new primary NIC that was created for the Premium VM.
3. Remove disks from the Standard Storage account.
4. Power on the Premium VM (if necessary).
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 109
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
The VMs step is displayed.
4. Select the VMs that will be part of this VPG and click the arrow pointing right to include these VMs in the VPG.
■ When using the Search field, you can use the wildcards; * or ?
Virtual machines that are not yet protected are displayed in the list. A VPG can include virtual machines that are not yet
protected and virtual machines that are already protected.
5. You can view protected virtual machines in the Advanced (One-to-Many) section, by clicking Select VMs.
The Select VMs dialog is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 110
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
In on-premise environments, protecting virtual machines in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
6. To define the boot order of the virtual machines in the VPG, click Define Boot Order, otherwise go to the next step.
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five (5) virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 111
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
For Example: Assume three groups, Default, Server, and Client, defined in this order. The boot delay defined for the
Default group is 10, for the Server group is 100, and for the Client group 0. The virtual machines in the Default group
are started together and after 10 seconds the virtual machines in the Server group are started. After 100 seconds the
virtual machines in the Client group are started.
e) Click OK to save the boot order.
When configuring boot order settings, define the boot disk to be first in the boot sequence in order to avoid boot failure.
8. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set, as shown below.
9. Specify the Recovery Site. This is the CCCsite to which you want to recover the virtual machines. After specifying the
recovery site, other fields are displayed.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 112
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that site.
10. Optionally, change the default SLA values:
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
■ Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert
is issued.
■ Test Reminder: The amount of time in months recommended between each test, where you test the integrity of the
VPG. A warning is issued if a test is not performed within this time frame.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 113
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
14. Select recovery settings for Failover/Move Recovery, and Failover Test.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 114
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
■ Network Security Group: The Azure network security to be associated with the virtual machines in this VPG. You can
associate one network security group with the virtual machines. The NIC will be associated with the network security
group defined at the virtual machine level.
■ Recovery Disk Type: Select the Azure recovery storage type to which the entire VPG will be recovered to; Premium
Managed or Standard Storage. The Virtual Machine Series and Virtual Machine Size fields are updated with the
relevant options based on the selected Recovery Disk Type.
Note: To protect Premium Managed disks, see Converting Premium Virtual Machines for Protection.
■ Virtual Machine Series: The virtual machine series from which to select the size. Azure virtual machine series are
optimized for different types of applications. The default is set to DSv2. You can choose the virtual machine series
appropriate for the application being protected in the VPG.
■ Virtual Machine Size: The virtual machine size, within the virtual machine series, to assign to recovered virtual
machines. Different sizes within a virtual machine series vary, for example in a number of cores, RAM, and local
storage size. The default is set to Standard_DS1_v2. You can choose the virtual machine size appropriate for the
application being protected in the VPG. The price per virtual machine is related to the virtual machine configuration.
15. For additional settings, click Advanced VM Settings.
The Advanced VM Settings dialog is displayed, which shows the recovery network settings for failover and move for virtual
machines in the VPG. You can see the recovery network settings for failover tests by clicking TEST.
16. To edit information in one field, click the field and update the information.
17. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM Settings dialog is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 115
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines from a vCenter Server
18. Update the values for vNet, Subnet, Network Security Group, Recovery Disk Type, Virtual Machine Series, Virtual Machine
Size, and Private IP as necessary.
Note: Only private IPs specified for Windows machines are assigned during a recovery operation. For Linux machines, the
IP is assigned from the specified subnet range.
Clearing the values in the Private IP field results in an IP being automatically assigned from the subnet range during a
recovery operation.
Refer to the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
19. Click OK twice to return to the main page of the Recovery step.
20. To run pre and post recovery scripts, enter the name of the script to run in the Command to run text box. You can then
enter details about the script.
■ Pre-recovery Script: The information about a script that should run at the beginning of the recovery process.
■ Post-recovery Script: The information about a script that should run at the end of the recovery process.
For both types of scripts, enter the following information:
TEXT BOX DESCRIPTION
Command to run The full path of the script. The script must be located on the same machine as the Zerto Virtual
Manager for the recovery site.
Params The parameters to pass to the script. Separate parameters with a space.
Timeout The time-out, in seconds, for the script to run.
■ If the script runs before executing a failover, move, or test failover, and the script fails or the
timeout value is reached, an alert is generated and the failover, move, or test failover is not
performed.
■ If the script runs after executing a failover, move, or test failover, and the timeout value is
reached, an alert is generated.
■ The default time-out value is specified in Site Settings > Performance and Throttling tab.
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCenter Server to a Recovery Site Microsoft Azure 116
CHAPTER 7: PROTECTING VIRTUAL
MACHINES TO AND FROM VCLOUD
DIRECTOR
When VMware vCloud Director (vCD) is installed at either the protected or recovery site, protection involving vCD can be set
up to cope with the following situations:
■ A disaster, enabling recovery to a point in time in the 30 days prior to the disaster.
■ The need to retain files saved either daily, weekly, monthly or yearly. The same wizard is used to set up both disaster
recovery and the retention policy.
Use any of the following procedures depending on the site to which you need to recover:
FROM A PROTECTED SITE TO A RECOVERY SITE SEE PROCEDURE...
To a different recovery site vCD “Replication From a Protected Site
vCenter Server vCenter Server to a Recovery Site vCD”,
on page 118
To a recovery site vCD “Replication From a Protected Site vCD
to a Recovery Site vCD”, on page 138
To a recovery site vCenter Server “Replication From a Protected Site vCD
to a Recovery Site vCenter Server”, on
page 160
VMware vCloud Director (vCD) To a Hyper-V site “Replication From a Protected Site vCD
to Hyper-V”, on page 180
To a Amazon Web Services (AWS) site “Replication From a Protected Site vCD
to AWS”, on page 199
To a Microsoft Azure site “Replication From a Protected Site vCD
to Azure”, on page 209
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Protecting Virtual Machines to and From vCloud Director 117
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
NOTE:
■ When the vCD site is set up within Zerto Cloud Manager, as described in Zerto Cloud Manager Administration Guide,
virtual machines in the underlying vCenter Server cannot be specified.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT. The VMs step is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 118
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
4. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these VMs in the VPG.
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ When using the Search field, you can use the wildcards; * or ?
The hardware version of the virtual machine must be the same or less than the hardware version supported by the vDC in
vCloud Director (vCD) otherwise recovery of the virtual machine in vCD is not permitted. Set the supported hardware level
in the Provider vDC Properties for the vDC in the vCloud Director console.
Virtual machines that are not yet protected are displayed in the list. A VPG can include virtual machines that are not yet
protected and virtual machines that are already protected.
5. You can view protected virtual machines in the Advanced (One-to-Many) section, by clicking Select VMs.
The Select VMs window is displayed.
6. Select a VM, using one of the filters from the drop-down list, All/Unprotected/Already Protected, then click OK.
7. Click NEXT.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 119
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Define as follows:
10. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
11. Specify the Recovery Org vDC to use in the recovery site.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 120
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
Note: At least one VRA needs to be installed on a host within a resource pool being used by a Recovery Org vDC.
12. Define the Service Level Agreement for which this VPG is associated.
■ When Zerto Cloud Manager is used, select the Service Profile to use.
The Service Profile determines the VPG SLA settings for the group. This applies predefined settings for the Journal
History, Target RPO Alert and the Test Reminder. These settings apply to every virtual machine in the group.
■ When a Custom service profile is available, the VPG SLA settings are editable, and the Advanced button becomes
available. When you change these settings, they apply to every virtual machine in the group.
13. To change the default Journal definitions, click Advanced. The Advanced Journal Settings dialog is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 121
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCenter Server to a Recovery Site vCD 122
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
17. To edit information for a single VM, click the field Storage Policy, or Journal Storage Policy, and update the information.
■ Storage Policy: The Storage Policy in which the VM configuration files will reside. See below for considerations.
■ Journal Storage Policy: The Storage Policy in which the VM Journal files will reside. See below for considerations.
■ Auto Select: Selecting this means that the journal can be placed in any datastore visible to the host that Zerto
selected for recovery, unless the datastore is excluded in the Configure Provider vDCs Dialog.
18. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM window is displayed.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 123
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ Zerto will select a datastore from the selected Storage Policy in which to place the Journal files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ The default Journal Storage Policy is the same as the default VM Storage Policy.
■ If Zerto did not manage to determine a default Journal Storage Policy, this field appears empty.
■ When you click to edit, the option Auto Select appears, and a list of Storage Policies.
■ The list of Storage Policies associated with the Journal:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Journal in the Configure Provider vDCs Dialog.
■ Auto Select: Selecting this means that the journal can be placed in any datastore visible to the host that Zerto selected
for recovery, unless the datastore is excluded in the Configure Provider vDCs Dialog.
Note: To review site-specific Storage Policy configurations, see Configure Provider vDCs Dialog.
21. Define the remaining fields as follows:
Replication From a Protected Site vCenter Server to a Recovery Site vCD 124
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCenter Server to a Recovery Site vCD 125
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
You can define Thin provisioning and Temp Data in this window, or you can alternatively define them when you separately
select and edit each VMs volume.
IMPORTANT:
Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in volume initial
synchronization.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 126
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ For Hyper-V recovery environments, the following window appears. For details, click here.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 127
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCenter Server to a Recovery Site vCD 128
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 130
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCenter Server to a Recovery Site vCD 132
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 133
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ To edit information in one field, click the field and update the information.
33. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
34. Otherwise, go to step step 37.
The Edit VNIC window is displayed.
35. Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ MAC Address: Whether the Media Access Control address (MAC address) used on the protected site should be
replicated on the recovery site. The default is to use the same MAC address on both sites.
■ vNIC IP Mode: Which IP mode to use. Specify the IP address if you choose static IP pool.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
then after the virtual machine has started, it is automatically rebooted so that it starts up with the correct IP. If the
same network is used for both production and test failovers, Zerto recommends changing the IP address for the virtual
machines started for the test, so that there is no IP clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
36. Click OK.
37. Click NEXT.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 134
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 135
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Monthly
Click the edit icon. The Monthly Retention window is displayed. ■ Run a retention process on the first, second, third,
fourth or last selected day of each month. For
example, you can choose to run a retention
process on the last Sunday of each month.
■ Or, you can run a retention process on a specific
date of the month up to the 28th and last. For
example, you can choose to run a retention
process on the 12th of each month.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Monthly
Retention window.
■ Keep for: Define the number of months to keep
the Monthly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
Replication From a Protected Site vCenter Server to a Recovery Site vCD 136
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCenter Server to a Recovery Site vCD 137
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
NOTES:
■ When the vCD site is set up within Zerto Cloud Manager, as described in Zerto Cloud Manager Administration Guide,
virtual machines in the underlying vCenter Server cannot be specified.
■ When machines are protected as a vCD vApp in a recovery site vCD, certain vCD settings are retained. To review
which settings are retained, see “Settings Maintained when Replicating from a Protected Site vCD to a Recovery
Site vCD”, on page 159.
NOTE:
The screen examples in the procedure below are based on VMware vCD version 5.6.3 and above, or 8.1 and above.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT. The VMs step is displayed.
4. Select vCloud Director then select the vCD vApp to protect in this VPG. The protected vCD vApp is recovered as a vCD
vApp.
■ When using the Search field, you can use the wildcards; * or ?
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ The boot order for vCD vApps is defined in the vCloud Director console.
■ Only vCD vApps that are unprotected are displayed in the list. A VPG can include:
■ Only one vApp.
■ vApps that are not yet protected.
■ vApps that are already protected.
5. To view protected vApps, in the Advanced (One-to-Many) section, click Select vApp.
6. Select a vApp, using one of the filters from the drop-down list, All/Unprotected/Already Protected, then click OK.
Note: With the One-to-Many feature, a VPG containing a single vApp can be recovered to a maximum of three different
sites and cannot be recovered to the same site more than once.
vApps protected in the maximum number of VPGs are not displayed in the Select VMs window.
Protecting vApps in several VPGs is enabled only if both the protected and recovery sites, and the VRAs installed on these
sites, are of version 5.0 and higher.
7. Click NEXT.
The Replication step is displayed.
Define as follows:
10. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
11. Specify the Recovery Org vDC to use in the recovery site.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
12. Define the Service Level Agreement for which this VPG is associated.
■ When Zerto Cloud Manager is used, select the Service Profile to use.
The Service Profile determines the VPG SLA settings for the group. This applies predefined settings for the Journal
History, Target RPO Alert and the Test Reminder. These settings apply to every virtual machine in the group.
■ When a Custom service profile is available, the VPG SLA settings are editable, and the Advanced button becomes
available. When you change these settings, they apply to every virtual machine in the group.
13. To change the default Journal definitions, click Advanced. The Advanced Journal Settings dialog is displayed.
Define as follows:
To edit information for a single VM, click the field Storage Policy, and/or Journal Storage Policy, and update the
information.
17. When selecting a Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place these files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ Zerto will try to determine a default Storage Policy according to:
■ A Storage Policy with the same name as the protected Storage Policy.
■ The default Orgvdc Storage Policy.
If Zerto did not manage to determine a default Storage Policy, this field appears empty.
■ When you click to edit, a list of Storage Policies appear. These Storage Policies:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Recovery Volume in the Configure Provider vDCs Dialog.
18. When selecting a Journal Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place the Journal files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ The default Journal Storage Policy is the same as the default VM Storage Policy.
■ If Zerto did not manage to determine a default Journal Storage Policy, this field appears empty.
■ When you click to edit, the option Auto Select appears, and a list of Storage Policies.
■ The list of Storage Policies associated with the Journal:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Journal in the Configure Provider vDCs Dialog.
■ Auto Select: Selecting this means that the journal can be placed in any datastore visible to the host that Zerto selected
for recovery, unless the datastore is excluded in the Configure Provider vDCs Dialog.
Note: To review site-specific Storage Policy configurations, see Configure Provider vDCs Dialog.
19. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM window is displayed.
■ Storage Policy: The Storage Policy in which the VM configuration files will reside. See considerations below.
■ Journal Storage Policy: The Storage Policy in which the VM Journal files will reside. See considerations below.
20. When selecting a Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place these files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ Zerto will try to determine a default Storage Policy according to:
■ A Storage Policy with the same name as the protected Storage Policy.
■ The default Orgvdc Storage Policy.
If Zerto did not manage to determine a default Storage Policy, this field appears empty.
■ When you click to edit, a list of Storage Policies appear. These Storage Policies:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Recovery Volume in the Configure Provider vDCs Dialog.
21. When selecting a Journal Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place the Journal files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ The default Journal Storage Policy is the same as the default VM Storage Policy.
■ If Zerto did not manage to determine a default Journal Storage Policy, this field appears empty.
■ When you click to edit, the option Auto Select appears, and a list of Storage Policies.
■ The list of Storage Policies associated with the Journal:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Journal in the Configure Provider vDCs Dialog.
■ Auto Select: Selecting this means that the journal can be placed in any datastore visible to the host that Zerto selected
for recovery, unless the datastore is excluded in the Configure Provider vDCs Dialog.
22. Define the remaining fields as follows:
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
You can define Thin provisioning and Temp Data in this window, or you can alternatively define them when you separately
select and edit each VMs volume.
IMPORTANT:
Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in volume initial
synchronization.
■ For Hyper-V recovery environments, the following window appears. For details, click here.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
■ To edit information in one field, click the field and update the information.
34. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
Otherwise, go to step step 37.
The Edit vNIC window is displayed.
35. Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ MAC Address: Whether the Media Access Control address (MAC address) used on the protected site should be
replicated on the recovery site. The default is to use the same MAC address on both sites.
■ vNIC IP Mode: Which IP mode to use. Specify the IP address if you choose static IP pool.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
then after the virtual machine has started, it is automatically rebooted so that it starts up with the correct IP. If the
same network is used for both production and test failovers, Zerto recommends changing the IP address for the virtual
machines started for the test, so that there is no IP clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
36. Click OK.
37. Click NEXT.
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved.
44. If you do not want to use the default settings, click the edit icon next to each retention setting and configure the following:
SETTING & DESCRIPTION SELECT...
Daily
Click the edit icon. The Daily Retention window is displayed ■ Run at: The time set to run all retention processes.
This field cannot be edited from the Daily
Retention window.
■ Keep For: Define the number of days to keep the
Daily Retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
Settings Maintained when Replicating from a Protected Site vCD to a Recovery Site vCD
The following tables display settings that are retained when replicating from a protected site vCloud Director to a recovery site
vCloud Director:
■ Edge Gateway Services, on page 159
■ vApp Properties, on page 159
■ Network, on page 159
■ VM Properties, on page 159
vApp Properties
SETTING SETTING RETAINED?
Leases (Runtime / Storage) No
vApp Description No
VM Start / Stop Yes
Sharing No
Metadata Yes
Network
SETTING SETTING RETAINED?
ORG Network No
(protected ORG vDC networks need to be mapped to recovery ORG vDC
networks)
Isolated vApp network Yes
(same gateway address used)
Routed vApp Network Yes
(same gateway address used, routed organization network mapped)
vApp Network Without NIC On It Yes
(same gateway address used)
VM Properties
SETTING SETTING RETAINED?
Metadata and Description No
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 160
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
4. Select vCloud Director then select the vCD vApp to protect in this VPG. The protected vCD vApp is recovered as a vCD
vApp.
■ When using the Search field, you can use the wildcards; * or ?
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ Only vCD vApps that are unprotected are displayed in the list. A VPG can include:
■ Only one vApp.
■ vApps that are not yet protected.
■ vApps that are already protected.
5. To view protected vApps, in the Advanced (One-to-Many) section, click Select vApp.
The Select vApp window is displayed.
Note: With the One-to-Many feature, a VPG containing a single vApp can be recovered to a maximum of three different
sites and cannot be recovered to the same site more than once.
vApps protected in the maximum number of VPGs are not displayed in the Select VMs window.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 161
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Protecting vApps in several VPGs is enabled only if both the protected and recovery sites, and the VRAs installed on these
sites, are of version 5.0 and higher.
Note: Define any required boot order for vCD vApps in the vCloud Director console.
6. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
7. In the Replicate To area, specify VC as the recovery site and default values to use for the replication to this site.
This is the site to which you want to recover the virtual machines. After specifying the recovery site, other fields are
displayed including the host and datastore to use for replication.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 162
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
8. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that site.
9. Host: The default cluster, resource pool or host in the recovery site that handles the replicated data.
If the site is defined in Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have
been specified as a resource in Zerto Cloud Manager.
Note: If Zerto Cloud Manager is used, vSphere Standard edition cannot be used.
For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration Guide.
When a resource pool is specified, Zerto checks that the resource pool capacity is enough for any virtual machines
specified in the VPG.
All resource pool checks are made at the level of the VPG and do not take into account multiple VPGs using the same
resource pool. If the resource pool CPU resources are specified as unlimited, the actual limit is inherited from the parent
but if this inherited value is too small, failover, move, and failover test operations can fail, even without a warning alert
being issued by Zerto Virtual Manager.
Note: If a resource pool is specified and DRS is disabled for the site later on, all the resource pools are removed by VMware
and recovery will be to any one of the hosts in the recovery site with a VRA installed on it.
10. Datastore: The default datastore to use for recovered virtual machine files and for their data volumes. Every datastore for
the selected recovery host is included in the drop-down list. If a cluster or resource pool is selected for the host, only
datastores that are accessible by every host in the cluster or resource pool are displayed.
11. Define the Service Level Agreement for which this VPG is associated.
■ When Zerto Cloud Manager is used, select the Service Profile to use.
The Service Profile determines the VPG SLA settings for the group. This applies predefined settings for the Journal
History, Target RPO Alert and the Test Reminder. These settings apply to every virtual machine in the group.
■ When a Custom service profile is available, the VPG SLA settings are editable, and the Advanced button becomes
available. When you change these settings, they apply to every virtual machine in the group.
12. To change the default Journal definitions, click Advanced. The Advanced Journal Settings dialog is displayed.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 163
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCD to a Recovery Site vCenter Server 164
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
15. To change the replication settings per virtual machine, click VM Settings.
The Advanced VM Replication Settings window is displayed.
In this window, you can edit the values of one or more of the virtual machines in the VPG.
All the virtual machines from a vCD vApp are displayed.
16. To edit information in one field, click the field and update the information.
17. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM window is displayed.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 165
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCD to a Recovery Site vCenter Server 166
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCD to a Recovery Site vCenter Server 167
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
You can define Thin provisioning and Temp Data in this window, or you can alternatively define them when you separately
select and edit each VMs volume.
IMPORTANT:
Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in volume initial
synchronization.
■ For Hyper-V recovery environments, the following window appears. For details, click here.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 168
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 169
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCD to a Recovery Site vCenter Server 170
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 172
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
You can use the vSphere Client console Performance tab for each virtual machine to help estimate the change rate. For
more details, refer to “WAN Sizing Requirements with Zerto”, on page 34.
25. Click OK.
26. Click NEXT.
The Recovery step is displayed. Recovery details include the networks to use for failover, move, and for testing failover, and
whether scripts should run as part of the recovery operation.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 174
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 175
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
The NICs step is displayed. In this step, you can specify the NIC details to use for the recovered virtual machines after a
failover, a test failover, or migration.
■ To edit information in one field, click the field and update the information.
31. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
32. Otherwise, go to step step 35.
The Edit vNIC window is displayed.
Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
33. In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ Create new MAC address?: Whether the Media Access Control address (MAC address) used on the protected site
should be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you
Replication From a Protected Site vCD to a Recovery Site vCenter Server 176
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
check this option, to create a new MAC address, and the current IP address is not specified, the protected virtual
machine static IP address might not be used for the recovered virtual machine.
■ Change vNIC IP Configuration?: Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is
only changed after recovery for virtual machines with VMware Tools running.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports Re-IPing.
■ To change the vNIC IP, in the Failover/Move or Test column, select Yes. If you select to use a static IP connection,
set the IP address, subnet mask, and default gateway.
■ Optionally, change the preferred and alternate DNS server IPs and the DNS suffix.
■ If you leave the DNS server and suffix entries empty, or select to use DHCP, the IP configuration and DNS server
configurations are assigned automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each
octet in the Default gateway field for the NICs with no default gateway.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP, then
after the virtual machine has started, it is automatically rebooted so that it starts up with the correct IP. If the same
network is used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines
started for the test, so that there is no IP clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
34. Click OK.
35. Click NEXT.
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 177
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
40. Daily and Monthly retentions are toggled ON by default and the default retention settings for Schedule, Type and Keep
For appear. By default, all retention processes are scheduled to run on the same day.
41. Toggle the Weekly or Yearly retentions from OFF to ON. The default retention settings for Schedule, Type and Keep For
appear. The retention setting Keep For is the length of time to keep the retention sets. For details of how this affects the
number of retention sets saved, see Storing Retention Sets.
Note: Daily or Weekly retentions must be configured. Weekly or Monthly retentions must be configured to Full.
42. If you do not want to use the default settings, click the edit icon next to each retention setting and configure the following:
SETTING & DESCRIPTION SELECT...
Daily
Click the edit icon. The Daily Retention window is displayed ■ Run at: The time set to run all retention processes.
This field cannot be edited from the Daily
Retention window.
■ Keep For: Define the number of days to keep the
Daily Retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
Replication From a Protected Site vCD to a Recovery Site vCenter Server 178
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
Replication From a Protected Site vCD to a Recovery Site vCenter Server 179
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Protecting Virtual Machines to and From vCloud Director
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
The VMs step is displayed.
4. Select vCloud Director then select the vCD vApp to protect in this VPG. The protected vCD vApp is recovered as a vCD
vApp.
■ When using the Search field, you can use the wildcards; * or ?
■ Zerto uses the SCSI protocol. Only virtual machines with disks that support this protocol can be specified.
■ Only vCD vApps that are unprotected are displayed in the list. A VPG can include:
■ Only one vApp.
■ vApps that are not yet protected.
■ vApps that are already protected.
5. To view protected vApps, in the Advanced (One-to-Many) section, click Select vApp.
The Select vApp window is displayed.
Note: With the One-to-Many feature, a VPG containing a single vApp can be recovered to a maximum of three different
sites and cannot be recovered to the same site more than once.
vApps protected in the maximum number of VPGs are not displayed in the Select VMs window.
Protecting vApps in several VPGs is enabled only if both the protected and recovery sites, and the VRAs installed on these
sites, are of version 5.0 and higher.
6. Select the vCD vApp to protect in this VPG.
Note: Define the required boot order for vCD vApps in the vCloud Director console.
7. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
8. Specify the Hyper-V recovery site and default values to use for the replication to this site.
■ Recovery Site: The site to which you want to recover the virtual machines. After specifying the Microsoft SCVMM
recovery site, the host and storage on the site to use for the replication can be specified.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
■ Host: The default cluster or host, in the recovery site that handles the replicated data.
■ Storage: The default storage volume to use for the recovered virtual machine files and for their data volumes. Every
storage for the recovery host is included in the drop-down list. If a cluster is selected for the host, only storage
accessible by every host in the cluster are displayed.
9. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
10. Optionally, change the Service Level Agreement settings, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
11. For additional journal-related fields, click ADVANCED.
The Advanced Journal Settings dialog is displayed. Configure as follows:
vSphere Hyper-V
■ Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert
is issued.
■ Test Reminder: The amount of time in months recommended between each test, where you test the integrity of the
VPG. A warning is issued if a test is not performed within this time frame.
12. Enable WAN Traffic Compression: Whether or not data is compressed before being transferred to the recovery site.
Compressing the data is more efficient, but results in a small performance degradation.
Note: WAN Traffic Compression is enabled by default when replicating to vCD.
■ Enable WAN traffic compression if network considerations are more critical than CPU usage considerations.
■ When WAN compression is enabled, the compressed data is written in compressed format to the recovery site
journal. Even if WAN compression is selected, Zerto decreases the level of compression if it takes too many resources.
The VRA automatically adjusts the compression level according to CPU usage, including totally disabling it if needed.
Zerto recommends enabling WAN compression.
■ Zerto can also work with third-party WAN optimization and acceleration technologies, such as those supplied by
Riverbed Technologies and Silver Peak.
■ When third-party WAN optimization is implemented, Zerto recommends disabling VPG WAN compression.
13. To change the replication settings per virtual machine, click VM Settings
The Advanced VM Replication Settings window is displayed.
■ To edit information in one field, click the field and update the information.
14. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM window is displayed.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto supports the SCSI protocol. Only disks that support this
protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto takes ownership of the preseeded disk, moving
it from its source folder to the folder used by the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto makes sure that the VMDK disk size is a
correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
The NICs step is displayed. In this step, you can specify the NIC details to use for the recovered virtual machines after a
failover, a test failover, or migration.
24. To edit information in one field, click the field and update the information.
25. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
26. Otherwise, go to step step 35.
The Edit VNIC window is displayed.
Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
27. In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ Create new MAC address?: Whether the Media Access Control address (MAC address) used on the protected site
should be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you
check this option, to create a new MAC address, and the current IP address is not specified, the protected virtual
machine static IP address might not be used for the recovered virtual machine.
To change the vNIC IP configuration, select Yes in the Failover/Move or Test column. If you select to use a statically-
assigned IP address, set the IP address, subnet mask, and default gateway. Optionally, change the preferred and alternate
DNS server IP addresses and the DNS suffix. If you leave the DNS server and suffix entries empty, or select to use DHCP,
the IP address and DNS server configurations are assigned automatically, to match the protected virtual machine. You can
change the DNS suffix.
If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each octet in
the Default gateway field for the NICs with no default gateway.
Note: During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP address than the
original IP address, after the virtual machine has started it is injected with the correct IP address. If the same network is
used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started for
the test, so that there is no IP address clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
28. Click OK.
29. Click NEXT.
The Retention Policy step is displayed. Retention properties govern the VPG retention, including the repository where the
retention sets are saved.
31. Select the Target Repository from the drop-down list. This is the name of the Repository where the retention sets are
written. The Connection Type and Path of that Repository appear after selecting the Target Repository.
32. Select the VMs to index from the File System Indexing drop-down list. For details on file system indexing, see Configuring
File System Indexing.
33. Run all retention processes at: The time to start the retention process.The time is shown in UTC and is according to the
Zerto Virtual Manager clock in the production site. All Daily, Weekly, Monthly or Yearly retentions will run at this time.
34. Daily and Monthly retentions are toggled ON by default and the default retention settings for Schedule, Type and Keep
For appear. By default, all retention processes are scheduled to run on the same day.
35. Toggle the Weekly or Yearly retentions from OFF to ON. The default retention settings for Schedule, Type and Keep For
appear. The retention setting Keep For is the length of time to keep the retention sets. For details of how this affects the
number of retention sets saved, see Storing Retention Sets.
Note: Daily or Weekly retentions must be configured. Weekly or Monthly retentions must be configured to Full.
36. If you do not want to use the default settings, click the edit icon next to each retention setting and configure the following:
SETTING & DESCRIPTION SELECT...
Daily
Click the edit icon. The Daily Retention window is displayed ■ Run at: The time set to run all retention processes.
This field cannot be edited from the Daily
Retention window.
■ Keep For: Define the number of days to keep the
Daily Retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
IOPS quota is reached, the failover process will switch to using slower gp2 disks. An event will notify the user of this,
and recommend that the user contact AWS support to increase the Max EBS Provision IOPS quota.
■ EBS encryption is enabled by default.
■ Depending on the desired RTO during recovery operations, or when testing failover, the user can select an import method
per VPG or per virtual machine from the following options:
■ “Zerto Import for Data Volumes”, on page 200
■ “Zerto Import for All Volumes”, on page 200
■ “AWS Import”, on page 201
NOTE:
If you are recovering to C5/M5 instances, skip this step and go to step step 2.
If you are running Windows 2012 or Windows 2016 on any of the following AWS instance types:
■ C3 ■ I2
■ C4 ■ R3
■ D2 ■ M4 (excluding M4.16xlarge)
a) Go to http://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/sriov-networking.html#enable-enhanced-
networking
b) Follow the instructions at the site for downloading and installing the Windows ENA Drivers.
2. When using C5/M5 instance types only, the following drivers need to installed:
a) Download ENA (Enhanced Network Adapter) from this link.
b) Extract and execute "InstallEna.ps1"
c) Download the NVMe driver from this link.
d) Extract and execute "Dpinst.exe"
NOTES:
C5/M5 instance types are supported with the Zerto Import for All Volumes import method only.
IMPORTANT:
When using this import method for Windows machines, ZertoTools for AWS needs to be run on the protected
Windows virtual machine in VMware before VPG creation. For more information, see ZertoTools for AWS.
AWS Import
This method uses a combination of the AWS import-instance and import-volume APIs for the boot and data volumes
respectively. This was the only method supported until version 5.5.
■ Each machine that you intend to protect must have at least 250MB free space. This is because AWS adds files to the
recovered machines during failover, move, test failover, and clone operations.
■ Protected boot volumes are recovered in EC2 as EBS disks with magnetic disk type. Virtual machines with disks that are
less than 1GB are recovered with disks of 1GB. Additional volumes might be created in the recovered instance, dependent
on the instance type used for the recovery. These volumes can be ignored.
■ Protected volumes are recovered in EC2 as EBS disks with magnetic disk type. Virtual machines with disks that are less
than 1GB are recovered with disks of 1GB. Additional volumes might be created in the recovered instance, dependent on
the instance type used for the recovery. These volumes can be ignored. Temporary disks may be created based on the
selected instance size.
■ The maximum protected data volume and boot disk size is 1TB.
The AWS ImportInstance API only supports single volume VMs. The boot volume of the protected virtual machine should not
be attached to any other volume to successfully boot. For more information, see http://docs.aws.amazon.com/AWSEC2/
latest/APIReference/API_ImportInstance.html
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
4. Select vCloud Director then select the vCD vApp to protect in this VPG. The protected vCD vApp is recovered as a vCD
vApp.
■ When using the Search field, you can use the wildcards; * or ?
■ Only vCD vApps that are unprotected are displayed in the list. A VPG can include:
■ Only one vApp.
■ vApps that are not yet protected.
■ vApps that are already protected.
5. To view protected vApps, in the Advanced (One-to-Many) section, click Select vApp.
The Select vApp window is displayed.
Note: With the One-to-Many feature, a VPG containing a single vApp can be recovered to a maximum of three different
sites and cannot be recovered to the same site more than once.
vApps protected in the maximum number of VPGs are not displayed in the Select VMs window.
Protecting vApps in several VPGs is enabled only if both the protected and recovery sites, and the VRAs installed on these
sites, are of version 5.0 and higher.
Note: Define the required boot order for vCD vApps in the vCloud Director console.
6. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set, as shown below.
7. Select the AWS recovery site.
■ Recovery Site: The site to which you want to recover the virtual machines. After specifying the recovery site, other
fields are displayed.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
8. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
■ Service Profile: The name of the service profile to use which determines the VPG SLA settings for the group, which
apply to every virtual machine in the group. To change the VPG SLA settings, select the Custom Service Profile.
9. If the VPG Service Level Agreement settings are editable, when the Zerto Cloud Manager is not used or when a Custom
service profile is available, specify these settings for the group, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
■ Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert
is issued.
■ Test Reminder: The amount of time in months recommended between each test, where you test the integrity of the
VPG. A warning is issued if a test is not performed within this time frame.
13. From the Import Method drop-down list, select an import method.
■ Zerto Import for data volumes (Faster): Uses the zImport method for data volumes only. This is the default setting
and usually has a faster RTO than AWS Import.
■ Zerto Import for all volumes (Fastest, Requires setup): This is usually the fastest import method and uses a zImport
VM for all volumes.
■ AWS Import: This was the only import method supported until version 5.5.
14. Select Failover/Move Recovery and Failover Test settings.
■ VPC Network: The virtual network dedicated to your AWS account. A security group and subnet must be assigned to
this VPC.
■ Subnet: The subnet for the VPC network.
■ When you select the import methods Zerto Import for data volumes (Faster), or Zerto Import for all volumes
(Fastest, Requires setup), only those subnets that are supported by the zImport method are displayed in the
drop-down list.
Other Subnets are grayed out and cannot be selected.
NOTE:
The zImport virtual machine must have access to the internet in order to access the S3 Bucket and the AMI in EC2. The
only network in the customer environment that is certain to have internet access is the network to which the ZCA is
connected.
If the import method is not AWS Import, then the user can select only subnets that are part of the same Availability
Zone as the one in which the ZCA resides. Other Subnets are disabled.
■ When you select the import methods AWS Import, all subnets are listed. A tool tip alert is displayed when the
user hovers over a subnet that is not supported.
NOTE:
If a subnet is chosen in a network that is not in the same Availability Zone as the one in which the ZCA resides, options
that utilize the zImport method will not be made available for selection.
■ Security Group: The AWS security to be associated with the virtual machines in this VPG.
■ Instance Family: The instance family from which to select the type. AWS instance families are optimized for different
types of applications. Choose the instance family appropriate for the application being protected in the VPG.
■ Instance Type: The instance type, within the instance family, to assign to recovered instances. Different types within
an instance family vary, for example in vCPU, RAM, and local storage size. Choose the instance type appropriate for
the application being protected in the VPG. The price per instance is related to the instance configuration.
■ To edit information in one field, click the field and update the information.
16. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
17. Update the values for VPC network, subnet, security group, instance family, instance type, and private IP as necessary.
Note: Only private IPs specified for Windows machines are assigned during a recovery operation. For Linux machines, the
IP is assigned from the specified subnet range.
Clearing the values in the Private IP field results in an IP being automatically assigned from the subnet range during a
recovery operation.
See the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
18. Click OK twice to return to the main page of the Recovery step.
19. To run pre and post recovery scripts, enter the name of the script to run in the Command to run text box. You can then
enter details about the script.
■ Pre-recovery Script: The information about a script that should run at the beginning of the recovery process.
■ Post-recovery Script: The information about a script that should run at the end of the recovery process.
For both types of scripts, enter the following information:
TEXT BOX DESCRIPTION
Command to run The full path of the script. The script must be located on the same machine as the Zerto Virtual
Manager for the recovery site.
Params The parameters to pass to the script. Separate parameters with a space.
Timeout The time-out, in seconds, for the script to run.
■ If the script runs before executing a failover, move, or test failover, and the script fails or the
timeout value is reached, an alert is generated and the failover, move, or test failover is not
performed.
■ If the script runs after executing a failover, move, or test failover, and the timeout value is
reached, an alert is generated.
■ The default time-out value is specified in Site Settings > Performance and Throttling tab.
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
20. Click NEXT. The Retention Policy page appears. Retention Policy is not available in Cloud environments.
21. Click NEXT. The Summary step appears, displaying the VPG’s configurations.
22. Click DONE. The VPG is created.
For details of what happens after creating the VPG, see “What Happens After the VPG is Defined”, on page 43.
NOTE:
To protect Premium Managed disks, see Converting Premium Virtual Machines for Protection.
2. Specify the name of the VPG and the priority of the VPG.
■ VPG Name: The VPG name must be unique. The name cannot be more than 80 characters.
■ Priority: Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site.
■ High Priority: When there are updates to virtual machines protected in VPGs with different priorities, updates
from the VPG with the highest priority are passed over the WAN first.
■ Medium Priority: Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority
VPGs have used it.
■ Low Priority: Low priority VPGs will use whatever bandwidth is left after the medium priority VPGs have use it.
Updates to the protected virtual machines are always sent across the WAN before synchronization data, such as
during a bitmap or delta sync.
During synchronization, data from the VPG with the highest priority is passed over the WAN before data from
medium and low priority VPGs.
3. Click NEXT.
4. Select vCloud Director then select the vCD vApp to protect in this VPG. The protected vCD vApp is recovered as a vCD
vApp.
■ When using the Search field, you can use the wildcards; * or ?
■ Only vCD vApps that are unprotected are displayed in the list. A VPG can include:
■ Only one vApp.
■ vApps that are not yet protected.
■ vApps that are already protected.
5. To view protected vApps, in the Advanced (One-to-Many) section, click Select vApp.
The Select vApp window is displayed.
Note: With the One-to-Many feature, a VPG containing a single vApp can be recovered to a maximum of three different
sites and cannot be recovered to the same site more than once.
vApps protected in the maximum number of VPGs are not displayed in the Select VMs window.
Protecting vApps in several VPGs is enabled only if both the protected and recovery sites, and the VRAs installed on these
sites, are of version 5.0 and higher.
Note: Define the required boot order for vCD vApps in the vCloud Director console.
6. Click NEXT.
The Replication step is displayed.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set, as shown below.
Specify the Azure Recovery Site. This is the site to which you want to recover the virtual machines. After specifying the
recovery site, other fields are displayed.
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that site.
7. ZORG: If the site is defined in Zerto Cloud Manager, select the name used by the cloud service provider (CSP) to identify
you as a Zerto Organization (ZORG). For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration
Guide.
8. When the Zerto Cloud Manager is used, select the service profile.
■ Service Profile: The name of the service profile to use which determines the VPG SLA settings for the group, which
apply to every virtual machine in the group. To change the VPG SLA settings, select the Custom Service Profile.
9. If the VPG Service Level Agreement settings are editable, when the Zerto Cloud Manager is not used or when a Custom
service profile is available, specify these settings for the group, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
Select the number of hours from 1 to 23 or the number of days from 1 to 30.
■ Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert
is issued.
■ Test Reminder: The amount of time in months recommended between each test, where you test the integrity of the
VPG. A warning is issued if a test is not performed within this time frame.
The Recovery step is displayed. Here you define Failover/Move Recovery details, and Failover Test details, like network
information, network security, storage information, virtual machine types and sizes, and whether scripts should run as part
of the recovery process.
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
13. Select the default recovery settings.
■ VNet: The virtual network dedicated to your Azure subscription.
■ Subnet: The subnet or the VNet network.
■ Network Security Group: The Azure network security to be associated with the virtual machines in this VPG. You can
associate one network security group with the virtual machines. The NIC will be associated with the network security
group defined at the virtual machine level.
■ Recovery Disk Type: Select the Azure recovery storage type to which the entire VPG will be recovered to; Premium
Managed or Standard Storage. The Virtual Machine Series and Virtual Machine Size fields are updated with the
relevant options based on the selected Recovery Disk Type.
Note: To protect Premium Managed disks, see Converting Premium Virtual Machines for Protection.
■ Virtual Machine Series: The virtual machine series from which to select the size. Azure virtual machine series are
optimized for different types of applications. The default is set to DSv2. You can choose the virtual machine series
appropriate for the application being protected in the VPG.
■ Virtual Machine Size: The virtual machine size, within the virtual machine series, to assign to recovered virtual
machines. Different sizes within a virtual machine series vary, for example in a number of cores, RAM, and local
storage size. The default is set to Standard_DS1_v2. You can choose the virtual machine size appropriate for the
application being protected in the VPG. The price per virtual machine is related to the virtual machine configuration.
14. For additional settings, click Advanced VM Settings.
The Advanced VM Settings window is displayed, which shows the network settings for Failover/Move Recovery and for
Failover Test virtual machines in the VPG. Y
■ To see the recovery network settings for Failover Test select the View Test from the drop-down list.
■ To edit information in one field, click the field and update the information.
15. To edit information for several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM Settings window is displayed.
16. Update the values for vNet, subnet, security group, storage information, virtual machine types and sizes, as necessary.
Note: Only private IPs specified for Windows machines are assigned during a recovery operation. For Linux machines, the
IP is assigned from the specified subnet range.
Clearing the values in the Private IP field results in an IP being automatically assigned from the subnet range during a
recovery operation.
Refer to the Zerto Interoperability Matrix for the list of operating systems for which Zerto supports re-IP.
17. Click OK twice to return to the main page of the Recovery step.
18. To run pre and post recovery scripts, enter the name of the script to run in the Command to run text box. You can then
enter details about the script.
■ Pre-recovery Script: The information about a script that should run at the beginning of the recovery process.
■ Post-recovery Script: The information about a script that should run at the end of the recovery process.
NOTE:
Pre and post recovery scripts run in parallel. Therefore, ensure that the pre and post recovery scripts don’t use common
resources.
19. Click NEXT. The Retention Policy step appears. This is not available in Cloud environments.
20. Click NEXT. The Summary step appears, displaying the VPG’s configurations.
21. Click DONE. The VPG is created.
For details of what happens after creating the VPG, see “What Happens After the VPG is Defined”, on page 43.
You can monitor information about all the VPGs either protected at the local site or recovered to the local site in the VPGs tab.
You can also drill-down to monitor information about a specific VPG displayed in the VPGs tab or about the virtual machines
being protected by VPGs. You can also view summary details of the protected and recovery sites in either the protected or
recovery site as well as monitor the status of each virtual protection group and any of the virtual machines being protected in
either site.
The following general monitoring options are described in this section:
■ “The DASHBOARD Tab”, below
■ “Monitoring VPGs – The VPGs Tab”, on page 218
■ “Monitoring a Single VPG”, on page 221
■ “Monitoring Tasks”, on page 224
■ “Monitoring Protected Virtual Machines – The VMs Tab”, on page 226
The following site monitoring option is described in this section:
“Monitoring Peer Sites – The SITES Tab”, on page 228
The following VRA monitoring option is described in this section:
“Monitoring Virtual Replication Appliances”, on page 229
The following storage monitoring option is described in this section:
“Monitoring Datastores – The SETUP Tab – The DATASTORES Tab”, on page 235
The following performance counters are described in this section:
“Zerto Performance Counters”, on page 237
For details about monitoring Zerto Virtual Manager alerts and events, see Zerto Guide to Alarms, Alerts and Events.
For details about monitoring Zerto Virtual Manager Long Term Retention repositories, see Storing Retention Sets.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Monitoring Zerto Virtual Manager 216
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Monitoring Zerto Virtual Manager
VPG HEALTH
The VPGs being recovered with the health of each VPG, represented by a colored block, where the color represents the
following:
Green: The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the target RPO value
specified for the VPG.
Red: The VPG is not being replicated, for example because communication with the site is down.
Positioning the mouse over a block displays the VPG name as a tooltip. Clicking the block opens the details tab for the VPG.
STATUS
The status of the site, including the following:
■ The number of VPGs and virtual machines being protected or recovered.
■ The amount of storage being protected.
■ The average RPO.
■ The percentage compression of data passed between the site and peer sites.
Performance Graphs
The current site performance, which includes the following information:
IOPS (I/O per Second): The total amount of I/O write operations generated by the protected virtual machines on the viewed
site. (The IOPS graph is displayed for VPGs replicating from on-premise sites).
Throughput (MB per second): The total amount of uncompressed data written by the virtual machines protected to the
recovery sites.
During synchronization processes (such as bitmap sync, initial sync and delta sync) this value will also consist of the
uncompressed data read from the protected disks.
WAN Traffic (MB per second): The total amount of compressed data transferred between the viewed site and all its recovery
sites.
A listing of the currently active alerts and running tasks, and the events run during the last few hours.
User input, for example, stopping a failover test or committing or rolling back a Move or Failover operation, can be initiated
from the relevant task displayed in the RUNNING TASKS section.
You can create a query using the view field to display VPG information in a list. You can filter the VPGs that will be displayed
according to their status by checking the checkboxes alongside the VPG status icons ( ). The query
can be customized by adding and removing filters.
■ Green: The VPG is being replicated, including syncing the VPG between the sites.
■ Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
■ Red: The VPG is not being replicated, for example, because communication with the remote site is down.
■ VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details
about the VPG that are displayed in a dynamic tab. The number of VMs protected in the VPG is displayed in parentheses.
■ Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
■ Peer Site: The name of the site with which this site is paired: the site where the VPG is protected or will be recovered to.
■ Priority: The priority of the VPG.
■ Protection Status: The current status of the VPG, such as Meeting SLA. Where appropriate, the percentage of the
operation completed, such as syncing, is displayed.
■ State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
■ Actual RPO: The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert
value specified for the VPG.
■ Operation: The operation, such as Move, that is currently being performed.
■ Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
■ Red: The VPG is not being replicated, for example, because communication with the remote site is down.
■ VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details
about the VPG that are displayed in a dynamic tab.
■ Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to
30 days before the disaster, or protection is extended to include retention sets of the virtual machines, going back for a
maximum of one year.
■ Retention Policy Status: The status of the retention set.
■ Repository Name: The name of the repository where the jobs are stored.
■ Restore Point Range: The restore points for the retention job out of the total retention jobs run for the VPG.
■ Retention Policy Scheduling: The schedule for the retention process.
General Tab
The tab on the left side shows the status of the VPG. The following information is displayed in this tab:
Performance Graphs
The current VPG performance, which includes the following information:
RPO: The current Recovery Point Objective (RPO) of the Virtual Protection Group (VPG).
IOPS (I/O per second): The total amount of I/O write operations generated by the protected virtual machines comprising the
Virtual Protection Group (VPG).
Throughput (MB per Second): The total amount of uncompressed data written by the protected virtual machines comprising
the Virtual Protection Group (VPG).
During synchronization processes (such as bitmap sync, initial sync and delta sync) this value will also consist of the
uncompressed data read from the protected disks..
WAN Traffic (MB per second): The total amount of compressed data transferred between the protected and recovery sites of
the Virtual Protection Group (VPG).
JOURNAL HISTORY
The journal history shows:
■ The SLA defined for the VPG.
■ The amount of time currently covered by information in the journal.
■ The earliest—oldest—checkpoint currently in the journal that can be used for a recovery operation.
■ Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to
30 days before the disaster, or protection is extended to include retention sets of the virtual machines, going back for a
maximum of one year.
■ Retention Status: The status of the retention set.
■ Repository: The name of the repository where the retention sets are stored.
■ Restore Point Range: The restore points for the retention sets out of the total retention sets run for the VPG.
■ Scheduling: The retention schedule.
The PROTECTED VMs tab shows details about the protected virtual machines:
Name: The name of the virtual machine.
Group: The boot order group to which the virtual machine belongs.
Protection Host: The protected virtual machine host.
Storage Protected: The name of the protected storage.
Provisioned: The protected virtual machine provisioned storage.
Used: The amount of data used on the recovery site for this virtual machine.
Recovery Data Size: The total size of the data on the recovery site.
Failover Network: The failover network used when recovering this virtual machine.
Test Network: The test network used when testing the recovery of this virtual machine.
The following details are displayed with a vSphere recovery site:
Recovery Host: The host to use for recovery.
VM Recovery Datastore: The name of the recovery datastore.
SITES Tab
The SITES tab shows the topology of the VPG, including both the protected and recovery sites.
SETTINGS Tab
The SETTINGS tab shows details about the VPG settings, divided into general, replication, recovery, and retention categories.
Monitoring Tasks
Tasks initiated by Zerto are also displayed in the vSphere Web Client and Client console.
Recent tasks can also be reviewed for a site by clicking the TASKS area in the status bar at the bottom of the user interface.
The full details of the tasks can be monitored in the TASKS subtab under the MONITORING tab.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
■ Alert status indicator: The color indicates the status of the VPG:
■ Green: The VPG is being replicated, including syncing the VPG between the sites.
■ Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
■ Red: The VPG is not being replicated, for example, because communication with the remote site is down.
■ VM Name: The name of the virtual machine. The name is a link.
■ VPG Name: The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about the
VPG that are displayed in a dynamic tab.
■ Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
■ Peer Site: The name of the site with which this site is paired: the site where the VPG is protected or will be recovered to.
■ Priority: The priority of the VPG.
■ Protection Status: The current status of the virtual machine, such as Meeting SLA. Where appropriate, the percentage of
the operation completed, such as syncing, is displayed.
■ State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
■ Actual RPO: The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert
value specified for the VPG.
■ Operation: The operation, such as Move, that is currently being performed.
PERFORMANCE View
The following information is displayed in the PERFORMANCE view:
■ IO: The IO per second between all the applications running on the virtual machine and the VRA that sends a copy to the
remote site for replication.
■ Throughput: The MB per second for all the applications running on the virtual machines being protected. There can be a
high IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus,
both the IOPS and Throughput values together provide a more accurate indication of performance.
■ Network: The amount of WAN traffic.
Provisioned Storage: The provisioned storage for the virtual machine in the recovery site. This value is the sum of the values
that are used in the vCenter Server and displayed in the vSphere Client console per virtual machine in the Virtual Machines tab
for the root vCenter Server node. Each value is the sum of both the hard disk and memory. Thus, a virtual machine with 1GB
hard disk and 4GB memory will show 5GB provisioned storage.
Used Storage: The storage used by the virtual machine in the recovery site. This value is the sum of the values that are used in
the vCenter Server and displayed in the vSphere Client console per virtual machine in the Virtual Machines tab for the root
vCenter Server node.
■ VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details
about the VPG that are displayed in a dynamic tab.
■ Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to
30 days before the disaster, or protection is extended to include retention sets of the virtual machines, going back for a
maximum of one year.
■ Retention Policy Status: The status of the retention set.
■ Repository Name: The name of the repository where the jobs are stored.
■ Restore Point Range: The restore points for the retention job out of the total retention jobs run for the VPG.
■ Retention Policy Scheduling: The schedule for the retention process.
Additional Fields
In the GENERAL, PERFORMANCE, and RETENTION views you can:
■ Show/Hide Columns, Create View and Reset Columns using the settings ( ) menu.
■ Sort the list by a column by clicking in the column title.
■ Filter information in the columns by clicking the filter button ( ) that is displayed when the mouse cursor is moved into
the column title. Active filters are displayed with a yellow background.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
Alert status indicator: The color indicates the alert status of the site:
Green: The Zerto Virtual Manager for the site is running without problems.
Orange: The Zerto Virtual Manager for the site has a problem that does not stop the protection of virtual machines, such
as an RPO value larger than the Target RPO Alert value for a VPG.
Red: The Zerto Virtual Manager for the site is not running correctly, for example, because communication with the site is
down.
Site Name: The name specified for the paired site during installation or in the Site Settings dialog.
Location: The location specified for the paired site during installation or in the Site Settings dialog.
Site IP: The IP of the peer site.
Network: The amount of WAN traffic.
IOPS: The IO per second between all the applications running on the virtual machine in the VPG and the VRA that sends a copy
to the remote site for replication.
Incoming Throughput: The MBs for all the applications running on the virtual machine being protected. There can be a high IO
rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the IO and
Incoming Throughput values together provide a more accurate indication of performance.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Used Storage (GB) – The amount of storage used by the virtual machines in the site.
ZORG Name – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager
Administration Guide.
Version – The Zerto version installed at this site.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
General View
In this view, the number of installed VRAs is displayed in the VRAs tab. The following information is displayed in this view:
Cluster: The cluster name, if relevant.
Host Address: The host IP address for the VRA. If the host is part of a cluster, the cluster name is displayed with the hosts
under the cluster.
SETTINGS View
The following information is displayed in the SETTINGS view:
VRA Group: The group of VRAs to which this VRA belongs. When VRAs use different networks, they can be grouped by
network.
VRA RAM: The amount of memory allocated to the VRA to buffer data before it is sent to the recovery site or at the recovery
site before it is written to the journal.
Datastore: The datastore used by the VRA.
Datastore Cluster: The datastore cluster used by the VRA, if relevant.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Cluster: The cluster with the host used by the VRA.
VC Network: The network used by the VRA.
# Volumes: The number of volumes for which the VRA manages the protection or recovery of data.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
Installed Tab
The tab on the left side shows the status of the VRA. The following information is displayed when this tab is selected:
Performance Graphs
■ CPU Usage: The percentage of CPU used by the VRA.
■ Local Memory: The percentage of the VRA memory used by protected volumes managed by the VRA. If the memory
consumption is high you can consider vMotioning some of the virtual machines to a different host.
■ Remote Memory: The percentage of the VRA memory used by recovery volumes managed by the VRA. If the memory
consumption is high you can consider changing the target host of some of the virtual machines to a different host.
VPGs Tab
Information about the VPGs with virtual machines that are on the host with the VRA is displayed in the VPGs tab.
GENERAL View
The following information is displayed in the GENERAL view:
Alert status indicator: The color indicates the status of the VPG:
Green: The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
Red: The VPG is not being replicated, for example, because communication with the remote site is down.
Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
Protected Site: The name of the protected site.
Recovery Site: The name of the recovery site.
Name: The name of the VPG.
Protection Status: The current status of the VPG, such as Meeting SLA. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
PERFORMANCE View
The following information is displayed in the PERFORMANCE view:
# VMs on VRA/#VMs in VPG: The number of virtual machines on the VRA and the number of virtual machines in the VPG.
Provisioned Storage: The provisioned storage for all the virtual machines in the VPG. This value is the sum of the values that
are used in the vSphere Client console per virtual machine in the Virtual Machines tab for the root vCenter Server node. Each
value is the sum of both the hard disk and memory. Thus, a virtual machine with 1GB hard disk and 4GB memory will show 5GB
provisioned storage.
Used Storage: The storage used by all virtual machines in the VPG. This value is the sum of the values that are used in the
vSphere Client console per virtual machine in the Virtual Machines tab for the root vCenter Server node.
IO: The IO per second between all the applications running on the virtual machines in the VPG and the VRA that sends a copy
to the remote site for replication.
Throughput: The MB per second for all the applications running on the virtual machines being protected. There can be a high
IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the
IOPS and Throughput values together provide a more accurate indication of performance.
■ VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details
about the VPG that are displayed in a dynamic tab.
■ Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to
30 days before the disaster, or protection is extended to include retention sets of the virtual machines, going back for a
maximum of one year.
■ Retention Policy Status: The status of the retention set.
■ Repository Name: The name of the repository where the jobs are stored.
■ Restore Point Range: The restore points for the retention job out of the total retention jobs run for the VPG.
■ Retention Policy Scheduling: The schedule for the retention process.
Additional Fields
There is an additional field that you can display. This field is listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
ZORG – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
VMs Tab
Information about the virtual machines that are on the host with the VRA is displayed in the VMs tab.
GENERAL View
The following information is displayed in the GENERAL view:
Alert status indicator: The color indicates the status of the VPG:
Green: The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
Red: The VPG is not being replicated, for example, because communication with the remote site is down.
Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
Protected Site: The name of the protected site.
Recovery Site: The name of the recovery site.
VM Name: The name of the virtual machine.
VPG Name: The name of the VPG with which this virtual machine is associated.
Protection Status: The current status of the virtual machine, such as Meeting SLA. Where appropriate, the percentage of the
operation completed, such as syncing, is displayed.
State: The current substatus of the virtual machine, such as Delta syncing. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
PERFORMANCE View
The following information is displayed in the PERFORMANCE view:
Provisioned on Host: The provisioned storage for the virtual machine on the host. This value is the sum of the values that are
used in the vSphere Client console for the virtual machine in the Virtual Machines tab for the root vCenter Server node. Each
value is the sum of both the hard disk and memory. Thus, a virtual machine with 1GB hard disk and 4GB memory will show 5GB
provisioned storage.
Used on Host: The storage used by the virtual machine in the VPG. This value is the sum of the values that are used in the
vSphere Client console for the virtual machine in the Virtual Machines tab for the root vCenter Server node.
IO: The IO per second between all the applications running on the virtual machines in the VPG and the VRA that sends a copy
to the remote site for replication.
Throughput: The MB per second for all the applications running on the virtual machine. There can be a high IO rate with lots of
small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the IOPS and Throughput
values together provide a more accurate indication of performance.
Additional Fields
There is an additional field that you can display. This field is listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
ZORG – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
SETTINGS Tab
Information about the VRA is displayed in the SETTINGS tab. This includes its version, the host on which it is located, its
definition, the networks it uses, and its replication and recovery settings.
GENERAL View
In this view, the number of available datastores is displayed in the DATASTORES subtab. The following information is
displayed in the GENERAL view:
Datastore: The name of the datastore or cluster.
Alert status indicator: The color indicates the alert status of the datastore:
Green: The datastore is functioning as required.
Orange: The datastore is functioning, but there are problems, such as not enough free space.
Red: There is a problem with the datastore.
Status: The status of the datastore.
Device: The datastore device identifier.
Cluster: The cluster that the datastore is associated with.
Total Usage (GB): The amount of GB used in relation to the total amount available.
DR Usage (GB): The amount of GB used by Zerto in relation to the total amount available.
# VRAs: The number of VRAs using the datastore.
Additional Fields
There are no additional fields that you can display. However, you can display all the fields shown in these views when you
select Show/Hide Columns from the dropdown list shown by clicking the configuration icon ( ).
After defining virtual protection groups (VPGs) the virtual machines specified as part of each VPG are protected. There are a
number of ongoing management tasks that you can perform on a VPG, such as specifying a checkpoint to enable recovery to
that specific point or you can modify the configurations of existing VPGs.
The following VPG management options are described in this section:
■ “Editing a VPG”, below
■ “Adding Virtual Machines to a VPG - Overview”, on page 243
■ “Removing Virtual Machines from a VPG”, on page 247
■ “Removing Virtual Machines from a vCD vApp”, on page 248
■ “Removing Protected Virtual Machines from the Hypervisor Inventory”, on page 248
■ “Modifying Protected Virtual Machine Volumes”, on page 249
■ “Pausing and Resuming the Protection of a VPG”, on page 250
■ “Forcing the Synchronization of a VPG”, on page 250
■ “Handling a VPG in an Error State”, on page 251
■ “Deleting a VPG”, on page 251
■ “Ensuring Application Consistency – Checkpoints”, on page 252
■ “Running Scripts Before or After Recovering a VPG”, on page 253
■ “Exporting and Importing VPG Definitions”, on page 257
■ “VPG Statuses and Synchronization Triggers”, on page 259
■ “Managing Protection When the Recovery Datastore Will Be Unavailable (Datastore Maintenance)” on page 266
Monitoring VPGs and the VMs that are protected is described in “Monitoring Zerto Virtual Manager”, on page 216.
Note:
To set up Long Term Retention to protect VPGs, or to manually run a Retention process (unscheduled retention
process) on the VPG, and to restore the VPG see “Using Zerto’s Long Term Retention”, on page 365. Configuring Long
Term Retention is part of defining a VPG.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing VPGs 240
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Managing VPGs
Editing a VPG
You can edit a VPG setting, including adding virtual machines to the VPG, as described in “Adding Virtual Machines to a VPG -
Overview”, on page 243, deleting virtual machines from the VPG, or changing the information about how virtual machines are
recovered.
Note: You cannot edit the VPG while a retention process is running.
After modifying the VPG, the setting is updated.
While the VPG settings are being updated, you cannot perform any operations on the VPG, such as adding a checkpoint,
editing the VPG properties, or failing the VPG.
After the settings are updated, the VPG is synchronized with the recovery site.
To modify a VPG:
1. In the VPGs tab in the Zerto User Interface, select the VPG to be edited and click MORE > Edit VPG. You can also select
the VPG, display the VPG details, and click EDIT VPG.
Note: The Edit VPG wizard is displayed, enabling editing the VPG, including adding and removing virtual machines from
the VPG. If the VPG was previously viewed, and the tab for this VPG is still displayed, you can access the details by
selecting the tab.
2. Make any required changes to the VPG settings, as described in “Protecting Virtual Machines from a vCenter Server”, on
page 45 or in “Protecting Virtual Machines to and From vCloud Director”, on page 117.
You can jump directly to a step to make a change in that step, for example, the REPLICATION step or the RECOVERY step,
by clicking the step.
Steps that have been completed are marked with a check.
Note: If the Journal Size Hard Limit or Journal Size Warning Threshold in the advanced journal settings for the VPG SLA
settings, or the default values are changed, the changed values are applied only to new virtual machines added to the VPG,
and not to existing virtual machines.
3. Click DONE.
The VPG is updated and then synchronized with the recovery site, if required, for example when the host was changed.
NOTE:
Changing a recovery Org vDC when recovering to vCD, results in an initial synchronization, resulting in all the
checkpoints being deleted.
See also:
■ “Modifying the Journal Size Hard Limit”, on page 242
■ “Modifying the Retention Period for Retention Sets”, on page 242
■ “Modifying VPG Recovery Volume”, on page 242
■ For the AWS Import and zImport for Data Volumes import methods, the AWS ImportInstance API only supports
single volume VMs. The boot volume of the protected virtual machine should not be attached to any other volume to
successfully boot. For more information, see
http://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ImportInstance.html
It is strongly recommended to perform a Failover Test to ensure that the recovered instance is successfully running on AWS.
See also: “Import Methods for AWS”, on page 91
■ Only virtual machines that are supported by Azure can be protected by Zerto. All Windows operating systems are
supported.
Note: Microsoft does not support operating systems that are past the End of Support date, without a Custom Support
Agreement (CSA). For more information about Microsoft operating systems support for Microsoft Azure, refer to
https://support.microsoft.com/en-us/kb/2721672.
■ To replicate between Azure and your site, you must have a virtual machine in Azure with a Zerto Cloud Appliance installed
on it. This ZCA must be paired with your site.
■ Only general-purpose v1 (GPv1) accounts are supported. GPv2 storage accounts are not supported.
■ Each ZCA requires a separate storage account. Multiple ZCAs using the same account is not supported.
■ For Linux distribution, refer to Azure documentation:
■ Linux on Azure-endorsed distributions:
https://azure.microsoft.com/en-us/documentation/articles/virtual-machines-linux-endorsed-distributions/
■ Information for non-endorsed distributions:
https://azure.microsoft.com/en-us/documentation/articles/virtual-machines-linux-create-upload-vhd-generic/
■ Ultra SSD storage is not supported.
See also “Azure Limitations Which Affect Installation and Recoverability”, on page 245.
The virtual machines are added to the VPG. This process may take a few minutes. While the VPG definition is being updated,
you cannot perform any operation on the VPG, such as adding a checkpoint, editing its properties, or recovering it.
After the VPG definition has been updated, the protected and recovery sites are then synchronized. During the synchronization
period, the Protection Status displayed in the VPGs tab of the Zerto User Interface is: Meeting SLA n/m VMs where n is the
number of virtual machines that were originally in the VPG, and m is the total number of virtual machines in the VPG, including
the virtual machines that are currently being synced. While the virtual machines that were added are being synced, the VPG
can be failed over but the failover only includes the original virtual machines in the VPG.
When the sync process for a virtual machine is complete, Zerto Virtual Manager tags the first checkpoint that includes a new
virtual machine with: VM ’XXX’ is fully synced where XXX is the name of the virtual machine that was synced.
When you perform a recovery operation using one of these checkpoints, or any later checkpoint, all the virtual machines that
have completed syncing will be recovered.
If the virtual machine is added to a VPG replicating to a resource pool in VMware vSphere environments, Zerto checks that the
additional virtual machine doesn’t exceed the resource pool capacity, such that the sum of the virtual machine reservation is
less than or equal to the resource pool CPU and storage settings.
3. Click Done.
4. Select Keep the recovery disks at the peer site if you might reprotect the virtual machines. Checking this option means
that the target replica disks for the virtual machines are saved so that they can be used as preseeded disks if the virtual
machines are re-protected.
5. Click YES to delete .
The VPG configuration is updated. The VRA on the recovery site that handles the replication for the VPG is updated
including keeping or removing the replicated data for the deleted VM, dependent on the Keep the recovery disks at the
peer site setting during the deletion.
The locations of the saved target disks are specified in the description of the event for the virtual machines being removed,
event EV0040, displayed in MONITORING > EVENTS.
■ Return the virtual machine or the host back into the hypervisor inventory.
■ In Edit VPG, remove from the VPG the virtual machine that was previously removed from VMware inventory.
To enable protecting a VPG after resizing a protected virtual machine RDM volume:
1. Remove the protected virtual machine from the VPG.
Note: If the VPG contains more than one virtual machine, remove the protected virtual machine from the VPG, and save
the changes. If the VPG contains only one virtual machine, delete the VPG, and, if the virtual machine target disks are of
VMDK format, make sure to choose to keep the target disks when the option is displayed.
2. Resize the RDM (both local and remote) as described in the VMware Expanding the size of a Raw Device Mapping (RDM)
knowledge base article.
Note: The vCenter will not detect that RDMs were resized unless this procedure is followed.
3. Protect the virtual machine again after resizing the RDM.
At this point, the VPG will go through a Delta Sync to compare protected and recovery volumes for changes, and once
synchronized, it will enter the Meeting SLA state.
NOTE:
■ If you choose a new volume, a volume initial sync is performed. During this period, new checkpoints are not added
to the journal and recovery operations cannot be performed on the VPG.
■ If you choose a preseeded volume, a delta sync is performed. During this period, new checkpoints are not added to
the journal but recovery operations are possible. During a delta sync, you can recover to the last checkpoint in the
journal.
IMPORTANT:
As soon as the VPG is updated, the VPG and all virtual machines in the VPG return to normal, and recovery operations can be
performed on the VPG.
Deleting a VPG
You can delete a VPG and either keep the target disks to use later for preseeding if you want to reprotect any of the virtual
machines in the deleted VPG or delete these disks. Any retention sets stored for the VPG are not deleted and the virtual
machines that were retained can be restored.
Note: You cannot delete a VPG while a retention process is running.
To delete a VPG:
1. In the Zerto User Interface, click the VPGs or VMs tab and select one or more VPGs to delete.
2. Click MORE > Delete.
The Delete VPG window opens.
3. Select Keep the recovery disks at the peer site if you might reprotect the virtual machines. Checking this option means
that the target replica disks for the virtual machines are saved so that they can be used as preseeded disks if the virtual
machines are re-protected.
4. Click APPLY to delete the VPG.
The VPG configuration is deleted. The VRA on the recovery site that handles the replication for the VPG is updated
including keeping or removing the replicated data for the deleted VPG, dependent on the Keep the recovery disks at the
peer site setting during the deletion.
The locations of the saved target disks are specified in the description of the event for the virtual machines being removed,
event EV0040, displayed in MONITORING > EVENTS.
See also “Deleting a VPG When the Status is Deleting”, on page 252.
A list of VPGs is displayed with the requested VPG selected. You can select more VPGs to add the same checkpoint to, for
example, when something is happening at your site that affects multiple VPGs.
Note: Crash-consistency is per VPG and not across VPGs, even if a checkpoint was added to multiple VPGs.
2. Enter a name for the checkpoint.
3. Click SAVE.
When testing a failover, as described in “Testing Recovery”, on page 324, or actually performing a failover, as described in
“Managing Failover”, on page 345, you can choose the checkpoint as the point to recover to.
Zerto recommends duplicating scripts on the Zerto Virtual Managers for both the protected and recovery sites, so that if
reverse protection is required, the scripts are available. The location of the script for reverse protection, on the machine where
the Zerto Virtual Manager that manages the protected site is installed, must be to the same path as in the remote Zerto Virtual
Manager machine. For example, if the scripts are saved to C:\ZertScripts on the remote Zerto Virtual Manager machine,
they must be saved to C:\ZertScripts on the local Zerto Virtual Manager machine.
The scripts can include environment variables that can be included as part of the script itself, or passed to the script as
parameters. When the script is passed an environment variable as a parameter, the variable is evaluated before executing the
script. The following environment variables are available:
■ %ZertoVPGName%: The name of the VPG. If the name includes a space, enclose the variable in double quotes (”). For
example, the VPG MyVPG uses the format %ZertoVPGName% but the VPG My VPG uses the format
“%ZertoVPGName%”.
■ %ZertoOperation%: The operation being run: FailoverBeforeCommit, FailoverRollback, Test, MoveBeforeCommit,
MoveRollback. Use the result returned for this variable to limit when the script runs, dependent on the operation. The
scripts are run after all the virtual machines are powered on at the recovery site and the variable is set to
FailoverBeforeCommit or MoveBeforeCommit. Use FailoverRollback or MoveRollback when rolling back the Failover or
Move operation, to undo whatever changes a previous script has done (such as updating the DNS records).
■ %ZertoVCenterIP%:The IP address of the hypervisor manager, VMware vCenter Server or Microsoft SCVMM, where the
VPG is recovered.
■ %ZertoVCenterPort%: The port used by the Zerto Virtual Manager to communicate with the hypervisor manager,
VMware vCenter Server or Microsoft SCVMM.
■ %ZertoHypervisorManagerIP%: The IP address of the hypervisor manager, VMware vCenter Server or Microsoft
SCVMM, where the VPG is recovered.
■ %ZertoHypervisorManagerPort%: The port used by the Zerto Virtual Manager to communicate with the hypervisor
manager, VMware vCenter Server or Microsoft SCVMM.
■ %ZertoForce%: A Boolean value, Yes/No, that dictates whether to abort the recovery operation if the script fails. For
example, whether to rollback a Move operation when the script fails and returns a non-zero value.
For example, if a specific VPG should not be migrated, the pre-recovery script can determine whether to continue based on the
values of the %ZertoOperation% and %ZertoVPGName%.
When specifying scripts in the definition of a VPG, enter values for the Pre-recovery Script and Post-recovery Script:
See also:
■ “Creating a Script”, on page 254
■ “Example Scripts”, on page 256
Creating a Script
There are many ways to create scripts to run before or after recovering a VPG. The following procedure uses a Windows
PowerShell file (.ps1) or a batch (.bat) file.
To create a script:
1. Create a file on the machine where the Zerto Virtual Manager that manages the recovery is installed.
2. Enter the script that you want to run in the file.
3. Save the file as a Windows PowerShell file (.ps1) or batch (.bat) file.
When writing a PowerShell script, you can include the environment variables in the script. For example, the following code
snippet shows the use of the %ZertoOperation% and %ZertoVPGName% environment variables:
$Operation = $env:ZertoOperation
$VPG = $env:ZertoVPGName
$time = Get-Date
Note: Zerto recommends testing both PowerShell and batch scripts by running them from the command line, to ensure that
they run correctly.
Example Scripts
IMPORTANT: The scripts are provided by example only and are not supported under any Zerto support program or service.
The following scripts are examples of how to provide scripts to use with Zerto:
■ “Example 1 – Recording Failover Tests”, below.
■ “Example 2 – Moving Virtual Machines to a Resource Pool After a Failover”, on page 256.
Where %1 is the first parameter in the list of parameters, %ZertoOperation%, and %2 is the second parameter in the list of
parameters, %ZertoVPGName%.
Note: If the file TestedVPGs.txt does not exist it is created, as long as the folder, c:\ZertoScripts\Results, exists.
##Variables:
##vCenter IP address
$strVCenterIP = "10.10.10.10"
##vCenter user account to use; account must have ability to move desired machines
$strVCUser = "Administrator"
##vcenter user password
$strVCPw = "password"
##Array of VMs to move; it includes ALL VMs in the VPG and is case sensitive.
$strVMtoMove = @("VM-1", "VM-2", "VM-3")
##End of script
2. Select the Export Protection Group Settings option and click Next.
3. Select the destination for the file to contain exported settings and specify the Zerto Virtual Manager IP address and port
where the VPGs are protecting virtual machines.
4. Click Next.
The list of exported VPGs is displayed.
5. Click Done.
Note: If you are uninstalling Zerto, the VPGs are deleted. To prevent having to perform a full synchronization when the VPG
definitions are imported, Zerto recommends deleting the VPGs in the Zerto User Interface, keeping their target disks.
4. Select the file previously exported and enter the Zerto Virtual Manager IP address and port specified when exporting the
VPGs.
5. Click Next.
The list of exported VPGs is displayed.
6. Select the VPGs to import. Only VPGs with names that are not already defined can be imported. VPGs in the import files
with the same name as an existing VPG are disabled.
7. Click Next.
The list of imported VPGs is displayed. If the VPG could not be imported, the reason for the failure is specified.
Note: If a host was removed from and then re-added to the environment it is advisable to wait approximately 5 minutes
from when the host was re-added before performing the import of the VPGs.
8. Click Done.
VPG Statuses
The following statuses are displayed:
STATUS SUBSTATUS COMMENT
Deleting Deleting the VPG
VPG waiting to be removed
Failing Over Committing Failover The VPG is being failed over.
Failing over – Before commit A VPG being failed over is in the initial stage, before
committing the failover.
Promoting The failover has completed and the data from the journal
is being promoted to the failed over virtual machine disk.
Rolling back Failover The failover is being rolled back to prior to the failover.
SUBSTATUS DESCRIPTION
Delta Syncing The Delta Sync uses a checksum comparison to minimize the use of network resources. A Delta
Sync is used when the protected virtual machine disks and the recovery disks should already be
synchronized, except for a possible few changes to the protected disks, for example:
■ When a virtual machine was added to the VPG and the target recovery disk is defined as a
preseeded disk.
■ After a source VRA upgrade of a major release: Depending on the nature of the upgrade, a
VRA upgrade on the protected side may trigger either a Delta Sync or a Bitmap Sync. See the
version release notes to determine if a sync will be triggered with a source VRA upgrade.
■ For reverse protection after a move or failover.
■ A Force Sync operation was manually initiated on the VPG.
■ A host protecting virtual machines was restarted and the protected virtual machines on the
host had not been vMotioned to other hosts in the cluster or a protected virtual machine was
vMotioned to another host without a VRA, and then vMotioned back to the original host.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal but recovery
operations are still possible, assuming there are valid checkpoints in the journal. If a disaster
occurs requiring a failover during a delta synchronization, you can recover to the last checkpoint
written to the journal.
Note: It is not possible to perform a move during a delta sync.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
Delta syncing a volume Synchronization when only delta changes for a volume needs synchronizing, for example, when a
volume is added to a protected virtual machine in a VPG, and a preseeded disk is used.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal but recovery operations
are still possible, assuming there are valid checkpoints in the journal. If a disaster occurs requiring
a failover during a delta volume synchronization, you can recover to the last checkpoint written to
the journal.
Note: It is not possible to perform a move during a delta sync.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
Error Problem situation, for example, when a ZVM is disconnected from a VRA used to protect virtual
machines. The VPG cannot be recovered until the problem is resolved,
Failing over - Before Preparing and checking the VPG virtual machines in the recovery site.
commit
SUBSTATUS DESCRIPTION
Full Syncing Full synchronization to ensure that the protected disks and recovery disks are the same after
some change to the system. This type of sync is the same as an Initial Sync but occurs after
protection started. In general, this type of sync should not happen.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
Note: During the synchronization, new checkpoints are not added to the journal. Also, recovery
operations are not possible.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
Initial Sync Synchronization performed after creating the VPG to ensure that the protected disks and
recovery disks are the same. Recovery operations cannot occur until after the initial
synchronization has completed.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
Adding a virtual machine to a VPG is similar to creating a new VPG, a volume initial sync is
performed for the new virtual machine. For more information, see Volume Initial Sync.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
Journal/recovery disks are Zerto Virtual Manager cannot locate disks that were connected to a virtual machine. As a result,
missing recovery operations cannot be performed on the VPG containing the virtual machine.
Journal storage error There was an I/O error to the journal. For example, if the journal was full and the size was
increased. Once the problem is resolved a synchronization is required.
Moving - Before commit Preparing and checking the VPG virtual machines in the recovery site.
Needs Configuration One or more configuration settings are missing, for example, when reverse protection is not
specified.
Promoting Updating recovered virtual machines in the VPG with data from the journal.
Recovery is possible Communication with the Zerto Virtual Manager at the protected site is down so continuing
protection is halted, but recovery on the remote site is available (compare with Site
disconnection).
Recovery storage error There was an I/O error to the recovery storage. For example, the datastore is almost full or the
virtual machines are turned off and the recovery disks are inaccessible.
Recovery storage policy The storage policy in the recovery site specified to be used by the VPG cannot be found.
error
Rolling back Rolling back to an initial status, for example, after canceling a cloning operation on the VPG.
Rolling back Failover Rolling back a Failover operation before committing it.
Rolling back Move Rolling back a Move operation before committing it.
Site disconnection Communication with the Zerto Virtual Manager at the remote, recovery, site is down so
continuing protection is halted (compare with Recovery is possible).
Site disconnection. No Communication with the Zerto Virtual Manager at the remote, recovery, site is down and there
checkpoints are no checkpoints to use to recover the VPG at the recovery site.
Syncing Status while type of synchronization is being evaluated.
SUBSTATUS DESCRIPTION
User paused protection Protection is paused to enable solving a journal disk space problem, for example, by increasing the
disk size or cloning the VPG.
VM not protected A virtual machine in the VPG is no longer being protected. For example, when the virtual machine
was moved to another host without a VRA.
Volume Full Syncing Synchronization when a full synchronization is required on a single volume.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal. Also, recovery
operations are not possible.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
Volume Initial Sync Synchronization when a full synchronization is required on a single volume, for example, when
changing the target datastore or adding a virtual machine to the VPG without using a preseeded
disk.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
Recovery can be performed on a VPG while a Volume Initial Sync is being performed for virtual
machines added to an existing VPG. However, only the virtual machines that were already in the
VPG can be recovered. The new virtual machines can only be recovered after the volume initial
sync for them is complete.
Note: Synchronization after a recovery starts after the promotion of data from the journal to the
virtual machine disks ends. Thus, synchronization of virtual machines can start at different times,
depending on when the promotion to the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or initial sync, etc.
VPG has no VMs A configured VPG where the virtual machines have been removed from it, for example when
changing both the datastore and host for the virtual machines in the VPG, causes the VPG to be
recreated.
VPG waiting to be An attempt to remove the VPG failed and it must be forcibly removed. For details, see “Deleting a
removed VPG When the Status is Deleting”, on page 252.
Zerto Virtual Manager Protection is paused to enable solving a journal disk space problem, for example, by increasing the
paused protection disk size or cloning the VPG.
TRIGGER DESCRIPTION
Force Sync The user requested to synchronize the VPG, as described in “Forcing the Synchronization of a
VPG”, on page 250.
Network Congestion The network bandwidth is not wide enough to handle all the data, causing some of the data to be
backed up.
Protected Storage Error An I/O error occurred to a protected virtual machine, after the data was sent to the recovery
side.
TRIGGER DESCRIPTION
Protected VRA The host where the VRA is installed is highly loaded: many updates are made to the protected
Congestion machines at the same time, causing a time lapse before the updates are passed to the recovery
site.
Recovery or Journal There was an I/O error either to the recovery storage or journal, for example if the journal was
Storage Error full and the size was increased. Once the problem is resolved a synchronization is required.
Recovery Storage The recovery datastore is being written to a lot, causing a delay for some of the data passed from
Congestion the protected site to be written to disk.
Recovery VRA A network error, such as the network being down for a period, requires a synchronization of the
Communication Problem VPG between the two sites, for example a Bitmap Sync.
VPG Configuration The configuration of the VPG changed resulting in a synchronization being required. For example,
Changed the size of the journal was changed.
To enable protection to continue when a virtual machine recovery storage will be unavailable:
1. Remove all virtual machines from the VPG definitions that use the unavailable storage as the recovery storage.
When saving the VPG a warning is displayed.
2. Click No.
Note: A VPG must always have at least one virtual machine defined and therefore you cannot remove all the virtual
machines from a VPG at once. If all the VPGs use a datastore that requires maintenance, remove all but one of the virtual
machines and after completing this procedure, add the virtual machines back to the VPG and repeat the procedure with
the last virtual machine.
3. Change the default recovery datastore in the VPG definition to a new default datastore, if it was set to the unavailable
storage.
4. Move the saved volumes to the default datastore.
5. Add the virtual machine back to the VPG, and configure the virtual machine volumes to use the saved volumes as
preseeded volumes.
6. Save the VPG definition with the new settings.
The VPG will undergo a Delta Sync before returning to the status Meeting SLA.
Managing Protection When the Recovery Datastore Will Be Unavailable (Datastore Maintenance) 266
CHAPTER 10: MANAGING VRAS
A VRA is a Zerto virtual machine that manages the replication of virtual machines across sites. A VRA must be installed on
every hypervisor that hosts virtual machines that require protecting in the protected site and on every hypervisor that will host
the replicated virtual machines in the recovery site. The VRA compresses the data that is passed across the WAN from the
protected site to the recovery site. The VRA automatically adjusts the compression level according to CPU usage, including
totally disabling it if needed.
The VRA is a custom, very thin, Linux-based virtual machine with a small footprint, disk – memory and CPU – and increased
security since there are a minimum number of services installed.
Zerto recommends installing a VRA on every host so that if protected virtual machines are moved from one host in the cluster
to another host in the cluster there is always a VRA to protect the moved virtual machines.
A VRA can manage a maximum of 1500 volumes, whether these are volumes being protected or recovered.
Note: VRAs and shadow VRAs are configured and managed by the Zerto Virtual Manager. You cannot take snapshots of VRAs
as snapshots cause operational problems for the VRAs.
The priority assigned to a VPG dictates the bandwidth used. The Zerto Virtual Manager distributes bandwidth among the
VRAs based on the VPG priority, and the VPGs with higher priorities are handled before writes from VPGs with lower priorities.
There are a number of tasks that you might need to perform on VRAs, including installing a new VRA on a host added to the
hypervisor management tool or uninstalling VRAs and moving the data maintained by a VRA to another VRA when a host
requires maintenance.
During normal operation, a VRA might require more disks than a single virtual machine can support. If this situation arises, the
VRA creates new shadow VRA virtual machines, used by the VRA to maintain additional disks (a diskbox). A shadow VRA
does not have an operating system and therefore does not have an IP address, or use VMware tools. A shadow VRA is created
proactively at the recovery site and prior to the recovery VRA reaching the SCSI target limit imposed by VMware: 15 SCSI
targets per SCSI controller and 4 SCSI controllers per virtual machine. This amounts to a limitation of 60 SCSI targets per
virtual machine. Similar to a VRA, a shadow VRA must be left to Zerto to manage, and must not be modified or removed for any
reason.
The following VRA management options are described in this chapter:
■ “Installing a VRA”, below
■ “Upgrading VRAs”, on page 272
■ “Editing VRA Settings”, on page 273
■ “Editing the VRA Connection Method or Password”, on page 275
■ “Changing a Recovery VRA”, on page 275
■ “Uninstalling VRAs”, on page 277
■ “Handling a VRA in an Error State (Ghost VRA)”, on page 278
■ “Managing Protection During VMware Host Maintenance”, on page 278
■ “Managing Protection When Moving a Host to a Different Cluster”, on page 279
■ “Support for VMware Virtual Update Manager (VUM)”, on page 279
Monitoring VRAs is described in “Monitoring Virtual Replication Appliances”, on page 229.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing VRAs 267
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing VRAs
Installing a VRA
Zerto recommends installing a VRA on every host in every site so that if protected virtual machines are moved from one host in
the cluster to another host in the cluster there is always a VRA to protect the moved virtual machines.
If the peer site VRAs are not on the default gateway, you must set up routing to enable the VRAs on this site to communicate
with the peer site VRAs before defining the VRAs. Setting up routing after defining VRAs only applies to VRAs installed after
the routing is set. Any existing VRA is not affected and access to these VRAs continues via the default gateway. If the default
gateway stops being used, you must reinstall the VRAs that were installed before setting up paired site routing.
To set up routing:
1. In the SETUP > VRAs tab, select MORE > Paired Site Routing.
The Configure Paired Site Routing dialog is displayed.
The Configure and Install VRA dialog is displayed. The dialog displayed depends on the ESX/i version:
within a group and not between groups. Thus, a VPG with a high priority is allocated bandwidth before VPGs with
lower priorities. VPGs that are on VRAs with different VRA groups, for example, VPG1 on VRA1 in group1 and VPG2 on
VRA2 in group2, do not affect each other, as the priority is relevant only within each group.
3. Specify the following VRA Network Details:
■ Configuration: Either have the IP address allocated via a static IP address or a DHCP server. If you select the Static
option, which is the recommended option, enter the following:
■ Address: The IP address for the VRA.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default gateway for the network.
4. Click INSTALL.
The VRA installation starts and the status is displayed in the TASKS popup dialog in the status bar and under
MONITORING > TASKS.
The VRA displayed name, and DNS name, is Z-VRA-hostname. If a virtual machine with this name exists, for example
when a previous VRA was not deleted, the VRA name has a number appended to it.
■
Upgrading VRAs
This section is applicable if Auto-Upgrade Virtual Replication Appliances was not selected when upgrading Zerto, or if a
manual VRA upgrade is required.
■ If a newer version of the installed VRAs exists, you can continue to use the current VRAs with the new version of Zerto, or
you can upgrade these VRAs from within the Zerto User Interface.
■ VRAs installed with the previous version of Zerto can work with VRAs installed with the current version of Zerto in any
combination (all from one version or a mix of VRA versions) as long as the VRAs are only one version lower than the
version of Zerto installed on the site.
■ Zerto recommends that you always upgrade the VRAs on your site to the latest version.
■ Not all new installations of Zerto require upgrading VRAs. If your VRA is outdated relative to your current version of
Zerto and an upgrade is available, the VRA version will be reported in the column as outdated. In addition, an alert is issued
on the site using the old VRA and on any site that is paired with it.
Note: You can move the mouse over the Outdated value to display the VRA version as a tooltip.
To upgrade VRAs:
1. For a VRA protecting virtual machines, if vMotioning the protected virtual machines:
a) Remove affinity rules for protected virtual machines on the host with the VRA to be upgraded.
b) vMotion these protected machines from the host to another host with a VRA.
2. In the Zerto User Interface, click SETUP > VRAs, select the VRAs to upgrade, and then click MORE > Upgrade.
The Upgrade VRAs dialog is displayed, listing the selected VRAs and whether an upgrade is available.
3. Review the list for the VRAs that you want to upgrade. Deselect any VRAs that you decide not to upgrade.
4. Click Upgrade Selected VRAs.
The following folder is created as part of the VRA installation and must not be removed:
C:\zerto-temp-<storage_name> – VRA installation files. <storage_name> signifies the target host.
When a VRA is installed using the local storage (c:\), there is only one folder with this name.
When a VRA is installed on remote storage, a second folders with the same name is also created where the VRA is
installed
The EDIT VM Recovery VRA window is displayed, listing all the virtual machines being recovered on that host.
3. Review the list and select the virtual machines to change the target host to another specified target host.
4. To change the target host for the selected VM:
■ Click the Select the replacement host drop-down list to get a list of available target hosts and choose the target host.
■ Click the edit pencil icon under the Target Host column to get a list of available target hosts and choose the target
host.
■ Click Auto Select the Replacement Host and the best suitable host will be automatically selected for that virtual
machine. The auto-selection is based on a load-balancing algorithm.
You can move some virtual machines to one replacement target host, and then by repeating the operation, you can move
other virtual machines to a different target host.
■ Validation is performed to make sure the selected target host can be used. For example, the datastores used by both
the VRAs are accessible from both hosts.
■ Any implications of the change, such as whether synchronization might be required after the change is also displayed.
5. Click APPLY
■ During this procedure you cannot edit the affected VPGs nor attempt a failover, move, failover test, or clone
operation.
■ At the end of the procedure a Bitmap Sync might be required to resynchronize the protected machines with the
recovery VRAs.
The EVACUATE HOST window is displayed, listing all the virtual machines being recovered on that host and their
automatically selected target host.
The auto-selection is based on a load-balancing algorithm. The suggested hosts must share the same cluster as the
evacuated host meaning load-balancing will be executed at the cluster level.
■ Validation is performed to make sure the selected target host can be used. For example, the datastores used by both
the VRAs are accessible from both hosts.
■ Any implications of the change, such as whether synchronization might be required after the change is also displayed.
3. Click APPLY.
■ During this procedure you cannot edit the affected VPGs nor attempt a failover, move, failover test, or clone
operation.
■ At the end of the procedure a Delta Sync might be required to resynchronize the protected machines with the recovery
VRAs.
Uninstalling VRAs
VRAs are uninstalled via the Zerto User Interface and not via the vCenter Server user interface. You cannot uninstall a VRA
which is used to protect or recover virtual machines.
For a VRA protecting virtual machines: Before uninstallng the VRA, remove affinity rules for protected virtual machines on the
host and vMotion these protected virtual machines to another host in the cluster with a VRA installed.
For a VRA recovering virtual machines: Before uninstallng the VRA, change the host for all virtual machines in VPGs
recovering to this VRA to another host as described in “Changing a Recovery VRA”, on page 275. A bitmap sync occurs to
synchronize the VPGs with the new host.
Note: If the VRA has crashed, or was accidentally deleted, it must be forcibly uninstalled, as described in “Handling a VRA in an
Error State (Ghost VRA)”, on page 278.
For a VRA in a cluster, you can remove it and then install a new VRA. However, to ensure that virtual machines in the cluster
are not moved to the host without a VRA from the time the VRA is removed to the time a new VRA is installed, it is
recommended to perform the following procedure.
Note: If the host is put into maintenance mode via the VMware’s vSphere Update Manager, the VRA is powered on
automatically when the host exits maintenance mode.
Note: Changing the VPG default host does not change the hosts for virtual machines already included in the VPG. These virtual
machine hosts must be changed directly by configuring the individual virtual machines in the VPG definition.
To enable VMware host maintenance for a VRA both protecting and recovering virtual machines:
1. Remove affinity rules for protected virtual machines on the host that requires maintenance and vMotion these machines to
any other host with a VRA installed.
2. Change the host for all virtual machines in VPGs recovering to this VRA to another host as described in “Changing a
Recovery VRA”, on page 275.
3. Wait for any synchronization to complete.
4. Enter VMware host into maintenance mode.
If prompted, do not migrate powered-off virtual machines. The VRA is automatically shut down.
5. (Optional) Remove the host from the cluster; place it under the data center entity, rather than the cluster entity.
6. Perform required maintenance. For example, upgrading the host.
7. Exit VMware host maintenance mode.
8. Power on the VRA.
Note: If the host is put into maintenance mode via the VMware’s vSphere Update Manager, the VRA is powered on
automatically when the host exits maintenance mode.
9. Wait for the Zerto Virtual Manager to connect to the local VRAs. You can monitor the alerts to determine when the
connections have been established.
10. (Optional) Add the host back into the cluster.
Note: If you do not remove the host from the cluster, a delta sync may accrue once the VMs are vMotioned back to the
host.
3. In the VMware Virtual Update Manager area, select Allow Zerto to always enter hosts to maintenance mode during
remediation.
■ When this is selected, if the Virtual Update Manager's Remediation task is detected, Zerto will automatically enter the
host into maintenance mode.
■ The host will exit maintenance mode when the Virtual Update Manager's Remediation task is completed.
■ The VRA is powered on automatically when the host exits maintenance mode.
Note: Automatic detection and powering off the VRA when running host maintenance mode is supported in vCenter
version 6.5. For more information see Zerto Virtual Replication Interoperability Matrix.
The Zerto Virtual Manager runs as a Windows service and connects to Zerto components, such as VRAs, as well as hypervisor
management tools, such as VMware vCenter Server and Microsoft SCVMM.
For the maximum number of virtual machines, either being protected or recovered to the Zerto Virtual Manager, see Zerto
Scale and Benchmarking Guidelines.
The following topics are described in this section:
■ “To check connectivity between Zerto Virtual Manager components:”, below
■ “Reconfiguring the Zerto Virtual Manager Setup”, on page 282
■ “Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager”, on page 284
■ “Replacing the SSL Certificate”, on page 285
■ “Pair to Another Site and Unpair Sites”, on page 285'
2. Select the Test Connectivity to Zerto Virtual Replication components option and click Next.
The IP Connectivity dialog is displayed.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing a Zerto Virtual Manager 281
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing a Zerto Virtual Manager
3. Select the connectivity you want to test and in the case of the Zerto Virtual Manager (ZVM), specify the TCP
communication port specified during the installation, if the default port, 9081, was changed.
4. Specify the type of test to perform:
Server: Test for incoming communication.
Client: Test for outgoing communication. Specify the IP address of the receiving Zerto Virtual Manager.
5. Click Next to test the specified connectivity.
The Server option listens for communication from a paired VRA. Stop listening by clicking Stop.
The Client options tests the client; on completion a result dialog is displayed.
6. Click Stop (server test) or OK (client test) to return to the Zerto Virtual Replication Diagnostics dialog.
2. Select the Reconfigure Zerto Virtual Manager option and click Next.
The installation settings for the connection to the vCenter Server are displayed.
■ IP/Host name used by Zerto User Interface: The IP to access the Zerto Virtual Manager from the Zerto User
Interface. If the machine has more than one NIC, select the appropriate IP from the list, otherwise the IP that is
displayed is the only option.
■ HTTPS Port (ZVM <-> Zerto User Interface): The port used for inbound communication between the Zerto User
Interface and the Zerto Virtual Manager.
■ TCP Port (ZVM<->ZVMs on other sites): The port used for communication between Zerto Virtual Managers.
■ Both the protected and recovery sites belong to the same enterprise: If you change the value, when pairing sites,
use the TCP port value you specify here.
■ An enterprise using a cloud service provider to supply disaster recovery services: You must not change this
value.
■ TCP Port (ZVM->VBA): The port used for communication between the Zerto Virtual Manager and the Virtual Backup
Appliance.
■ HTTP Certificate: Check Replace SSL Certificate and browse for a certificate, if you change the certificate you have
been using.
5. Click Next.
The connectivity is checked.
Note: If one of the tasks fails, click the link for information about why it failed. Usually it is a mistake when entering an IP
address.
6. Click Next.
The Zerto Virtual Manager is reconfigured.
7. Click Finish.
8. If you changed the IP address of the Zerto Virtual Manager, or the TCP port it uses to communicate with paired Zerto
Virtual Managers on other sites, you have to unpair these sites, both from this site and from the remote sites and then pair
the sites again.
Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager
1. Click Start > Programs > Zerto Virtual Replication > Zerto Diagnostics.
The Zerto Virtual Replication Diagnostics menu dialog is displayed.
2. Select the Change SQL Server Credentials option and click Next.
The installation settings for the SQL Server are displayed. Change the IP and username and password if necessary.
Server Name: The domain name and server instance to connect to, with the format <server_name>\<instance_name>
or <Server_IP>\<instance_name>.
Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager 284
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing a Zerto Virtual Manager
To pair to a site:
1. In the Zerto User Interface, in the SITES tab click PAIR.
The Add Site dialog is displayed.
Unpairing Sites
You can unpair any two sites that are paired to each other.
IMPORTANT: if there is a VPG on either of the sites you are unpairing, the VPGs will be deleted.
Clustered Concepts
TERM OR PHRASE DEFINITION
clustered role Clustered applications and services
node Clustered nodes (meaning, servers) are connected by physical cables and by software.
If one or more of the cluster nodes fail, other nodes begin to provide service
continuously.
Active/passive node A resources cluster where only one instance is active at any given time.
Zerto Failover Cluster Role Mover The Zerto Failover Cluster Role Mover tool facilitates an unobtrusive move of the
clustered role from one node to the other, with minimal consequences to Zerto Virtual
Manager.
switch node
Microsoft Failover Clustering A Windows Server feature that enables you to group multiple servers together into a
fault-tolerant cluster (renamed in Windows Server 2008 from Microsoft Cluster
Service (MSCS))
Minimal downtime The time it takes for the ZVR to start.
Use Cases
With your clustered Zerto Virtual Manager environment running, you are able to perform the following procedures:
OPERATION DESCRIPTION FOLLOW PROCEDURE...
Operating System maintenance You have a running clustered Zerto Virtual “Performing Maintenance on
Manager, which has one active and one passive your Zerto Virtual Manager
node. Operating System”, on
page 288
You need to perform operating system
maintenance on both of the nodes.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing a Zerto Virtual Manager Cluster 287
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing a Zerto Virtual Manager Cluster
Note:
To install a ZVM cluster, see Zerto Virtual Replication Installation Guide for VMware vSphere and Microsoft Hyper-V
Environments, in the section Installing Zerto in Clustered vSphere Environments.
Considerations
■ This procedure can be performed only when an external SQL Server is used.
■ The ZVM IP will be used as the Cluster IP. It is configured in the Zerto role IP. This is used so as to maintain connections to
existing peer sites and to retain VPG configurations.
If you change the IP, you will need to pair all the peer sites, and reconfigure the VPGs.
Note:
When relevant, you are able to switch back from a clustered environment to a non-clustered environment.
Go to, Switching from a Clustered Environment to a Non-Clustered (Standard) Environment.
10. Reconfigure the Zerto Services Startup Type from Automatic to Manual. To do this:
a) Open the Services manager.
b) Select and right-click the service Zerto Virtual Manager.
c) Navigate to Properties > General tab, Startup type drop-down list, and select Manual.
d) Repeat steps b and c for the services Zerto Virtual Backup Appliance, and Zerto Online Services Connector.
11. Change the Log On modes to a domain account for the services Zerto Virtual Manager and Zerto Virtual Backup
Appliance. To do this:
a) Navigate to Properties > Log On tab.
b) Select This account, then enter the same domain account credentials which you entered when you installed the first
clustered node, First Clustered Node - Installing Zerto Virtual Replication.
12. Update the Registry. Go to the Registry, navigate to HKEY_LOCAL-MACHINE > SOFTWARE > Zerto > Zerto Virtual
Replication, and create the FailOverCluster key with it’s sub-keys.
a) Right-click the key Zerto Virtual Replication, and select New > Key, then enter FailoverCluster.
b) Right-click the key FailoverCluster, and select New > Key, then enter ClusterDetails.
c) Right-click the key FailoverCluster, and select New > Key, then enter ZvmRoleDetails.
13. Select the ClusterDetails sub-key, then set the cluster IP value:
a) In the right pane, right-click and select New > String value.
b) Enter the value name: IP
c) Right-click IP, select Modify, then enter the value data: Cluster IP
14. Select the ClusterDetails sub-key, then set the cluster name value:
a) In the right pane, right-click and select New > String value.
b) Enter the value name: Name
c) Right-click Name, select Modify, then enter the value data: Cluster Name
15. Select the ZvmRoleDetails sub-key, then set the ZVM role IP value:
a) In the right pane, right-click and select New > String value.
b) Enter the value name: IP
c) Right-click IP, select Modify, then enter the value data: Role IP
16. Select the ZvmRoleDetails sub-key, then set the ZVM role name value:
a) In the right pane, right-click and select New > String value.
b) Enter the value name: Name
c) Right-click Name, select Modify, then enter the value data: Role Name
17. Configure the ZVM Role on the cluster. See Configuring the Role with Zerto Services.
Note:
The user who runs the Windows Zerto Virtual Manager service must be configured with permission to ‘logon as a
service’.
4. Best Practice: Enter the domain username and password of the user who will run the Zerto Virtual Manager Service.
Note:
Make sure that the domain user has the required privileges.
5. Click NEXT.
The Database Type window appears.
■ In the Database Type window you connect the first node to an external Microsoft SQL Server. This is the same
database which will be used for the second node.
■ Do not select Connect to an existing database - that option will be used when you install Zerto on the second node,
later on.
6. Connect to the external database by selecting Connect to an external Microsoft SQL Server or Microsoft SQL Server
Express database, then enter the SQL Server Authentication details.
a) Server Name: The domain name and server instance to connect to, with the format:
<server_name>\<instance_name> or <Server_IP>\<instance_name>
b) Specify an authentication method. Select one of the following:
■ Windows Authentication
- or -
■ SQL Server Authentication
c) If you selected Windows Authentication: This option is enabled only if a specific service user account was specified in
Windows Service User, in 4. In this case, the service account name and password are used.
d) If you selected SQL Server Authentication, the Test Authentication button is also displayed.
Define the following:
■ Username: The user name for the SQL Server database.
■ Password: A valid password for the given user name.
The installer checks whether it can connect to the specified database with the specified username and password.
e) Click TEST CONNECTION. You can only continue when the authentication is successful.
7. Click NEXT. The vCenter Server Connectivity window appears.
8. Enter connection settings that the Zerto Virtual Manager uses to communicate with the vCenter Server:
■ IP/Host name: The IP address or host name of the machine where the vCenter runs.
■ Username: The user name for a user with administrator level privileges to the vCenter Server. The name can be
entered using either of the following formats:
■ username
■ domain/username
■ Password: A valid password for the given user name.
9. Click NEXT.
■ For further steps on vCloud Direct (vCD) Connectivity, continue to 10.
■ Otherwise, go to 15.
10. The vCloud Director Connectivity window is displayed.
11. When using vCloud Director and you have installed an AMQP server, click the Enable vCD BC/DR checkbox and enter the
VMware vCloud Director access details:
■ IP / Host name: The IP address or host name of the machine where vCD runs. When connecting to vCD with multiple
cells, enter the virtual IP for the network load balancing used by the cells.
■ Username: The user name for an administrator to vCD.
■ Password: A valid password for the given user name.
■ AMQP Username: The user name for the AMQP server.
■ AMQP Password: A valid password for the given AMQP user name.
If the vCD connection settings are not specified, for example, when you do not have an AMQP server installed, they
can be set in the Advanced Settings dialog in the Site Configuration panel, in the Zerto User Interface after
installation, as described in the Zerto Cloud Manager Administration Guide.
TIP:
Zerto provides an AMQP installation kit if you do not have one installed for vCD.
■ Run ZertoAMQPInstallWizard.exe as described in the Zerto Cloud Manager Administration Guide, and enter the
following credentials:
■ Username: The AMQP user account Zerto will use. RabbitMQ prior to version 3.3 installs with a default
administrator user: guest. In RabbitMQ version 3.3 and higher, specify a user with administrator privileges.
■ Password: The password for the user. RabbitMQ prior to version 3.3 installs with a default password of guest.
12. Click NEXT.
The Cluster Details window appears.
The Online Services and Zerto Mobile Application are enabled by default.
■ You can disable these services by deselecting Enable Online Services and Zerto Mobile Application.
18. Click NEXT.
Note: If the vSphere Client console was open during the installation, close it and reopen it to ensure you have the Zerto
Virtual Manager user interface loaded.
23. Continue with step 3 on 290.
Note:
The user who runs the Windows Zerto Virtual Manager service must be configured with permission to ‘logon as a
service’.
4. Best Practice: Enter the domain username and password of the user who will run the Zerto Virtual Manager Service.
Note:
Make sure that the domain user has the required privileges.
5. Click NEXT.
9. Enter connection settings that the Zerto Virtual Manager uses to communicate with the vCenter Server:
■ IP/Host name: The IP address or host name of the machine where the vCenter runs.
■ Username: The user name for a user with administrator level privileges to the vCenter Server. The name can be
entered using either of the following formats:
■ username
■ domain/username
■ Password: A valid password for the given user name.
10. Click NEXT.
■ For further steps on vCloud Direct (vCD) Connectivity, continue to 11.
■ Otherwise, go to 16.
12. When using vCloud Director and you have installed an AMQP server, click the Enable vCD BC/DR checkbox and enter the
VMware vCloud Director access details:
■ IP / Host name: The IP address or host name of the machine where vCD runs. When connecting to vCD with multiple
cells, enter the virtual IP for the network load balancing used by the cells.
■ Username: The user name for an administrator to vCD.
■ Password: A valid password for the given user name.
■ AMQP Username: The user name for the AMQP server.
■ AMQP Password: A valid password for the given AMQP user name.
If the vCD connection settings are not specified, for example, when you do not have an AMQP server installed, they
can be set in the Advanced Settings dialog in the Site Configuration panel, in the Zerto User Interface after
installation, as described in the Zerto Cloud Manager Administration Guide.
TIP:
Zerto provides an AMQP installation kit if you do not have one installed for vCD.
■ Run ZertoAMQPInstallWizard.exe as described in the Zerto Cloud Manager Administration Guide, and enter the
following credentials:
■ Username: The AMQP user account Zerto will use. RabbitMQ prior to version 3.3 installs with a default
administrator user: guest. In RabbitMQ version 3.3 and higher, specify a user with administrator privileges.
■ Password: The password for the user. RabbitMQ prior to version 3.3 installs with a default password of guest.
13. Click NEXT. The Cluster Details window appears.
14. Enter the cluster details, exactly as they were entered on the first node:
Cluster Name The exact name of the cluster, as it was created in the Failover Cluster Manager.
Cluster IP The IP of the cluster, as it was defined in the Failover Cluster Manager.
Zerto role name The exact name of the role, as it was created in the Failover Cluster Manager.
Zerto role IP The IP of the first role, at it appears in the Failover Cluster Manager.
15. Click NEXT.
16. The Zerto Virtual Manager Site Details window appears, where you define general information about the site.
The Online Services and Zerto Mobile Application are enabled by default.
■ You can disable these services by deselecting Enable Online Services and Zerto Mobile Application.
19. Click NEXT.
The Zerto Virtual Manager Communication window appears.
In this window you define the connection settings (ports) which are used by Zerto Virtual Manager to communicate with
Zerto Virtual Managers on other sites.
3. Define the Policies. Navigate to the Policies tab, and configure the following:
If resource fails, attempt restart on current node Select this option
Period for restart 15:00 (minutes)
Maximum restarts in the specified period 10
Delay between restarts 30 (seconds)
If restart is unsuccessful, fail over all resources in this Role Deselect this option
If all the restart attempts fail, begin restarting again after the specified period Select this option
4. Proceed to Adding and Configuring the Online Services Connector Service.
There are a number of configuration tasks that you can perform, some of which should be done as part of the initial site
configuration.
The following topics are described in this chapter:
■ “Site Settings”, below
■ “Seeing What Is Licensed”, on page 316
■ “Submitting a Support Ticket”, on page 317
■ “Submitting a Feature Request”, on page 318
■ “About Zerto”, on page 318
Site Settings
The Site Settings dialog enables configuring various site settings. These include the default script timeout and protection
policies such as the commit policy for a failover or move operation.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Advanced Site Configuration 308
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Advanced Site Configuration
2. Make any required changes to the settings, click SAVE and then APPLY. The following settings can be defined:
■ “Editing Information About a Site”, below
■ “Defining Performance and Throttling”, on page 311
■ “Defining Site Policies”, on page 313
■ “Configuring Email Settings”, on page 314
■ “Defining Resource Report Sampling Period”, on page 315
■ “Reviewing Supported Host Versions”, on page 316
Licensing is described in “Seeing What Is Licensed”, on page 316. You also use the Site Settings to set up Zerto cloud connector
static routes and VMware vCloud Director from the Cloud Settings item. For details, refer to Zerto Cloud Manager
Administration Guide.
1. In the Zerto User Interface (top right), click SETTING ( ) and select Site Settings.
The Site Settings dialog is displayed.
■ In vSphere and Hyper-V sites, the following fields are displayed:
■ (Mandatory) Contact Name: The name of the person to contact if a need arises. Mandatory.
■ Contact Email: An email address to use if a need arises.
■ Contact Phone: A phone number to use if a need arises.
3. (On premise environments) To change the User Credentials to access the vCenter or Hyper-V SCVMM server from the
Zerto Virtual Manager:
■ User Name: The administrator name used to access the vCenter or SCVMM server. The name can be entered using
either of the following formats:
■ username
■ domain\username
■ Password: The password used to access the vCenter or SCVMM server for the given user name. To ensure security,
after saving the settings, the password field is cleared.
4. (Azure environments only) Azure Settings:
■ Application Name: The name used to access Azure.
■ Client ID: A unique identifier that is associated with the access name.
■ Subscription: The subscription associated with the user.
■ Resource Name: The name of the resource the user created.
■ Storage Account Name: The name of the storage account created or selected for this site during installation.
5. Click SAVE.
■ Bandwidth Throttling:
Define this to control the amount of traffic going out of your site. When defined, this is the maximum bandwidth that Zerto
uses from this site to all peer recovery sites.
If you do not specify bandwidth throttling, the default is for Zerto to automatically assign the bandwidth used per VPG,
based on using the maximum available and then prioritizing the usage according to the priority set for the VPGs sending
data over the WAN.
Note: For minimum bandwidth requirements, see Zerto Scale and Benchmarking Guidelines.
■ By default, Limited is selected.
■ In the text box, set the MB/sec. The valid range is from 0 to 1300 MB/sec.
■ With 0 MB/sec, Zerto automatically assigns the bandwidth used per VPG, based on using the maximum available and
then prioritizing the usage according to the priority set for the VPGs sending data over the WAN.
■ Enter the MB/sec when the value required is 100 MB/sec or more.
■ Time-based Throttling:
Define this to throttle the bandwidth during specific times. For example, during the daily peak transaction period you can
change the bandwidth throttling, to override the general setting.
■ Enable Bandwidth Regulation: Use this for troubleshooting - to enable regulating the bandwidth.
■ Enable IO throttling: If a host is handling too many IOs, then the IOs begin to get high latencies. To offset this the VRA
sends fewer concurrent IOs. The latency is measured by taking the average latency for all IOs over a set period of time. For
example, when the period is 5000 milliseconds and the bad IO latency is 40, the average latency is calculated every 5
seconds, and if the average latency exceeds 40, the VRA sends fewer concurrent IOs.
■ Bad IO Latency VM: The threshold above which the latency is considered high, and therefore bad.
■ Requested Duration (ms): The period of time used to measure the average latency.
2. In the Disaster & Recovery area, choose the Failover/Move Commit Policy to use during a failover or move operation,
described in Initiating Failover Live and Moving Protected Virtual Machines to a Remote Site respectively. The following
options are available:
■ None: The failover or move operation must be manually committed or rolled back by the user.
■ Commit: After the time specified in the Default Timeout field the failover or move operation is committed, unless
manually committed or rolled back by the user before the time-out value is reached. During the specified time you can
check the recovered VPG virtual machines.
■ Rollback: After the time specified in the Default Timeout field the failover or move operation is rolled back, unless
manually committed or rolled back by the user before the time-out value is reached. During the specified time you can
check the recovered VPG virtual machines.
The value set here applies as the default for all failover or move operations from this point on but can be changed when
defining a failover or move operation.
3. Specify the Default Timeout after which a Commit or Rollback commit policy is performed. A value of zero indicates that
the system will automatically perform the commit policy, without waiting for any user interaction.
4. In the Pre/Post Recovery Operations Scripts area, specify the timeout in seconds for a script to run before or after a
failover, move, or test failover in the Default Script Execution Timeout field.
For information about scripts, see “Running Scripts Before or After Recovering a VPG”, on page 253.
5. In the Replication area:
■ If the same site is to be used as both the protected and recovery site, select Enable Replication to Self.
For more details, see “Enabling Replication to the Same Site”, on page 32.
■ Choose the Replication Pause Time, which is the time to pause when the journal might have problems, resulting in the
loss of all checkpoints. For example, when the datastore for the journal is almost full.
■ Replication pause time is the amount of time that the transfer of data from the protected site to the journal on the
recovery site is paused.
■ This time can then be used by the administrator to resolve the issue, for example by cloning the virtual machines
in the VPG, described in “Cloning Protected Virtual Machines to the Remote Site”, on page 355.
■ The value defined here is applied to existing and new VPGs.
Email Settings
2. Specify the SMTP server Address. The Zerto Virtual Manager must be able to reach this address.
3. If the SMTP Server Port was changed from the default, 25, specify the port number.
4. Specify a valid email address for the email sender name in the Sender Account field.
5. Specify a valid email address where you want to send the email in the To field.
You can test that the email notification is set up correctly by clicking SEND TEST EMAIL. A test email is sent to the email
address specified in the To field.
6. Click APPLY or SAVE.
These samples are used to generate resource reports as described in “Zerto Reports”, on page 393.
■ License Type: What is licensed: whether the license restricts the number of virtual machines that can be protected or the
number of sockets used.
■ Expiry Date: The license expiry date.
■ Quantity: The maximum amount licensed, either virtual machines or sockets, based on the license type. If blank, the
quantity is unlimited.
■ Usage: The sites using the license and the number of protected virtual machines in each site.
A warning is generated when either the license expires or more than the licensed number of virtual machines are being
protected. Protection continues but the license should be updated. After getting a new license key you can update Zerto with
this key.
1. In the Zerto User Interface, in the top right of the header click SETTING ( ) and select License.
2. Enter a valid license key and click APPLY or SAVE.
The license is updated on the local site and the paired remote sites.
1. In the Zerto User Interface, click in the top right of the header and select Open a Case.
The Open Support Case window for the site opens.
1. In the Zerto User Interface, on the top right of the header, click .
2. Click Submit Feature Request; the Feature Requests page in myZerto opens.
About Zerto
Zerto provides a number of operations to recover virtual machines at the remote site. This chapter describes these operations.
The following topics are described in this chapter:
■ “The Failover Test Operation”, on page 320
■ “The Move Operation”, below
■ “The Failover Operation”, on page 321
■ “The Restore File Operation”, on page 322
■ “The Clone Operation”, on page 322
In addition, when Long Term Retention (extended recovery) is defined, a VPG can be restored as described in “Restoring VMs
or VPGs from a Repository”, on page 387.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Disaster Recovery Operations 320
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Overview of Disaster Recovery Operations
Note: The Move operation without reverse protection does not remove the VPG definition but leaves it in a Needs Configuration
state.
The following diagram shows the positioning of the virtual machines before and after the completion of a Failover operation.
Note: The Failover operation without reverse protection does not remove the VPG definition but leaves it in a Needs
Configuration state.
The following diagram shows the positioning of the virtual machines before and after the completion of a Clone operation.
In order to verify that the disaster recovery that you have planned is the one that will be implemented, Zerto recommends
testing the recovery of the VPGs defined in the protected site to the recovery site. This chapter describes how to test VPG
recovery.
The following topics are described in this chapter:
■ “The Test Failover Process”, below
■ “Starting and Stopping Failover Tests”, on page 325
■ “Viewing Test Results”, on page 329
■ “Live Disaster Recovery Testing”, on page 329
Note: You cannot perform a failover test while a retention process is running.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Testing Recovery 324
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Testing Recovery
constraints, testing the failover of every VPG configured for recovery to this cluster, at the same time, will show whether the
constraints are violated or not.
When configuring a VPG, specify the period between tests for that VPG in the Test Reminder field in the REPLICATION step of
the Create VPG wizard.
See also:
■ “Starting and Stopping Failover Tests”, on page 325
■ “Viewing Test Results”, on page 329
■ “Live Disaster Recovery Testing”, on page 329
You can select the checkpoint to use for the recovery and see if a boot order and scripts are defined for the VPG.
4. By default, the last checkpoint added to the journal is displayed in the Checkpoint column
■ To use this checkpoint, proceed to the next step.
■ To change the checkpoint, click the link that appears as the checkpoint.
To use a checkpoint which is not the latest checkpoint, or the latest tagged checkpoint, choose Select from all available
checkpoints. By default, this option displays all checkpoints in the system. You can choose to display only automatic, or
tagged checkpoints, or any combination of these types.
5. Click OK. If the selected VMs were not protected when the selected checkpoint was taken, a warning will appear informing
the user that these VMs cannot be recovered. If all selected VMs cannot be recovered, an error will appear.
6. Click NEXT.
The FAILOVER TEST step is displayed. The topology shows the number of VPGs and virtual machines being tested to
failover to each recovery site.
■ In the Zerto User Interface, click the VPGs tab, and then click the name of a VPG you are testing. A dynamic tab is created
displaying the specific VPG details including the status of the failover test.
You can also stop the test via the TASKS popup dialog in the status bar, or by selecting MONITORING > TASKS.
During any live test, Zerto recommends that you only maintain one working version of the same virtual machine.
As such, the first step in any test, except for a Failover Test or Clone, is to make sure that the protected virtual machines are
shut down before starting to test recovered machines.
During a Zerto Move operation the first step Zerto performs is to shut down the protected machines, to ensure data integrity.
However, a Zerto Failover operation assumes that the protected virtual machines are no longer accessible (the total site
disaster scenario) and does not attempt to shut them down at the beginning of the operation.
In a live test using a Failover operation you have to manually shut down the virtual machines to be tested at the beginning of
the test in order to prevent potential split-brain situations where two instances of the same applications are live at the same
time.
If you want to perform a live DR test that includes a simulated disaster you can simulate the disaster, for example, by
disconnecting the network between the two sites. In this type of test, once the disaster is simulated a Move operation cannot
be used, since it requires both sites to be healthy, while a Failover operation can be used.
Basic Verification – User Traffic Is Not Run against the Recovered VMs
Basic testing that the virtual machines can recover is done using either a Failover Test operation or an uncommitted Move
operation, using the Rollback setting.
■ “Using a Failover Test Operation: Recommended Procedure for a Live DR Test”, on page 331
■ “Using a Failover Test Operation: Failover Test Considerations”, on page 331
■ The protected machines are turned off until the end of the test, ensuring that there are no conflicts between the protected
site and recovery site.
■ During the testing period, every change is recorded in a scratch volume to enable rolling back.
■ Therefore, since both the scratch volume and virtual machines being moved are on the same site, performance can be
impacted by the increased IOs during the testing period.
■ In addition, the longer the test period the more scratch volumes are used, until the maximum size is reached, at
which point no more testing can be done.
■ The maximum size of all the scratch volumes is determined by the journal size hard limit and cannot be changed.
■ The scratch volumes reside on the storage defined for the journal.
■ You can only recover to the last checkpoint written to the journal, at the start of the Move operation.
■
This chapter describes a planned migration of a VPG to a remote site. The following topics are described in this chapter:
■ “The Move Process”, below
■ “Moving Protected Virtual Machines to a Remote Site”, on page 337
■ “Reverse Protection For a Moved VPG”, on page 341
Note: You cannot perform a move while a retention process is running.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Migrating a VPG to a Recovery Site 335
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Migrating a VPG to a Recovery Site
If reverse protection is not possible, the original protected site virtual machines or vCD vApp are not powered off and
removed.
Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ Promoting the data from the journal to the machines. The machines can be used during the promotion and Zerto ensures
that the user sees the latest image, even if this image, in part, includes data from the journal.
Note: Virtual machines cannot be moved to another host during promotion. If the host is rebooted during promotion, make
sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before starting up the
recovered virtual machines.
■ If reverse protection is specified, the virtual disks used by the virtual machines in the protected site are used for the reverse
protection. A Delta Sync is performed to make sure that the two copies, the new recovery site disks and the original
protected site disks, are consistent. A Delta Sync is required since the recovered machines can be updated while data is
being promoted.
If reverse protection is not specified, the VPG definition is saved but the state is Needs configuration and the virtual disks
used by the virtual machines in the protected site are deleted. Thus, in the future if reverse protection is required, the
original virtual disks are not available and an initial synchronization is required.
Note: If reverse protection is specified, the Keep Source VMs option is grayed out because the virtual disks of the VMs
are used for replication and cannot have VMs attached. If Keep Source VMs is selected before reverse protection is
specified, the Keep Source VMs selection is canceled.
A move differs from a failover in that with a move you cannot select a checkpoint to restore the virtual machine to. Also, to
ensure data integrity, the protected virtual machines are powered off completely and a final checkpoint created so that there is
no data loss before the move is implemented.
You can initiate the Move operation from either the protected site or recovery site.
To initiate a move:
1. In the Zerto User Interface select ACTIONS > MOVE VPG.
The Move wizard is displayed.
You can change the following values to use for the recovery:
■ Commit Policy
■ Force Shutdown policy
Reverse Protection settings
■ Keep Source VMs settings
You can also see if a Boot Order and Scripts are defined for the VPG.
4. To change the commit policy, click on the field or select the VPG and click EDIT SELECTED.
a) To commit the recovery operation automatically, with no testing, select Auto-Commit and 0 minutes.
b) Select None if you do not want an automatic commit or rollback. You must manually commit or roll back.
If some VMs in a VPG fail to recover properly and Auto-Commit was selected for the operation, the commit policy will
change to None. You must manually commit or rollback.
c) To test before committing or rolling back, specify an amount of time to test the recovered machines, in minutes.
This is the amount of time that the commit or rollback operation is delayed, before the automatic commit or rollback
action is performed.
During this time period, check that the new virtual machines are OK and then commit the operation or roll it back.
The maximum amount of time you can delay the commit or rollback operation is 1440 minutes, which is 24 hours.
Testing that involves I/O is done on scratch volumes.
■ The more I/Os generated, the more scratch volumes are used, until the maximum size is reached, at which point no
more testing can be done.
■ The maximum size of all the scratch volumes is determined by the journal size hard limit and cannot be changed.
■ The scratch volumes reside on the storage defined for the journal.
5. To force a shutdown of the virtual machines, click the Force Shutdown checkbox. If the virtual machines cannot be
gracefully shut down, for example if VMware Tools is not installed on one of the virtual machines in the VPG, the Move
operation fails unless you specify that you want to force the shutdown. If a utility is installed on the protected virtual
machines, the procedure waits five minutes for the virtual machines to be gracefully shut down before forcibly powering
them off.
6. To specify reverse protection, where the virtual machines in the VPG are moved to the recovery site and then protected in
the recovery site, back to the original site, double-click the Reverse Protection field and click the REVERSE link.
The Edit Reverse VPG wizard is displayed.
■ You can edit the reverse protection configuration. The parameters are the same as described when you create a VPG,
described in “Protecting Virtual Machines from a vCenter Server”, on page 45, with the following differences:
■ You cannot add or remove virtual machines to the reverse protection VPG.
■ By default, reverse protection is to the original protected disks. You can specify a different datastore to be used for
the reverse protection.
■ If VMware Tools are available, for each virtual machine in the VPG, the IP address of the originally protected
virtual machine is used. Thus, during failback the original IP address of the virtual machine on the site where the
machine was originally protected is reused. However, if the machine does not contain the utility, DHCP is used.
■ The host version must be 4.1 or higher for re-IP to be enabled.
7. To prevent the protected virtual machines or vCD vApp from being deleted in the protected site, click the Keep source
VMs checkbox.
IMPORTANT:
■ The virtual machines or vCD vApp will be removed from the other VPGs that are protecting them if the following
conditions apply:
■ The virtual machines or vCD vApp are already protected in other VPGs
■ Reverse protection is specified
■ Keep Source VMs is not checked
■ If your VPG has a vCD vApp, or if there are no other virtual machines left to protect, the entire VPG will be removed.
■ Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
8. Click NEXT.
■ A warning appears informing the user that the virtual machines or vCD vApp will be removed from the other VPGs
that are protecting them.
■ If your VPG has a vCD vApp, or if there are no other virtual machines left to protect, the entire VPG will be removed.
■ When reverse protection is specified for a VPG residing on a vCD site that is replicating to either a vSphere or Hyper-
V site, the boot order settings will not reserve the start delay vCD vApp settings for virtual machines with the same
order number.
The MOVE step is displayed. The topology shows the number of VPGs and virtual machines being moved to each peer site.
In the following example, 2 VPGs will be moved to Site6-Ent2-R2, and they contain 5 virtual machines; and 1 VPG will be
moved to Site5-Ent2-P2-R2 and it contains 2 virtual machines.
Note: If a virtual machine exists on the recovery site with the same name as a virtual machine being migrated, the machine
is moved and named in the peer site with a number added as a suffix to the name, starting with the number 1
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the Move operation, is written to thin-provisioned
virtual disks, one per virtual machine in the VPG. These virtual disks are automatically defined when the machines are
created on the recovery site for testing. The longer the test period the more scratch volumes are used, until the maximum
size is reached, at which point no more testing can be done. The maximum size of all the scratch volumes is determined by
the journal size hard limit and cannot be changed. The scratch volumes reside on the storage defined for the journal. Using
these scratch volumes makes committing or rolling back the Move operation more efficient.
Note: You cannot take a snapshot of a virtual machine before the Move operation is committed and the data from the
journal promoted to the moved virtual machine disks, since the virtual machine volumes are still managed by the VRA and
not directly by the virtual machine. Taking a snapshot of a machine that is in the process of being moved will corrupt that
machine.
12. Check the virtual machines on the recovery site, then either:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Or, in the specific VPG tab, click the Commit or Rollback icon ( ).
■ Click Commit to confirm the commit and, if necessary set, or reset, the reverse protection configuration. If the
protected site is still up and you can set up reverse protection, you can reconfigure reverse protection by checking
the Reverse Protection checkbox and then click the Reverse link. Configuring reverse protection here overwrites
any of settings defined when initially configuring the failover.
■ Click Rollback to roll back the operation, removing the virtual machines that were created on the recovery site and
rebooting the machines on the protected site. The Rollback dialog is displayed to confirm the rollback.
You can also commit or roll back the operation in the TASKS popup dialog in the status bar or under
MONITORING > TASKS.
After the virtual machines are up and running and committed in the recovery site, the powered off virtual machines in the
protected site are removed from the protected site. Finally, data is promoted from the journal to the moved virtual machines.
Notes:
■ If virtual machines or vCD vApp are already protected in several VPGs, and reverse protection is configured, the virtual
machines or vCD vApp are deleted from the protected site. This will result in the removal of these virtual machines from
other VPGs that are protecting them and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other
virtual machines are left to protect, the entire VPG will be removed.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
■ If Keep Source VMs is selected, the protected virtual machines are not removed from the protected site.
Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site, as
well as the VRAs installed on these sites, are of version 5.0 and higher.
During promotion of data, you cannot move a host on the moved virtual machines. If the host is rebooted during promotion,
make sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before starting up the
recovered virtual machines.
Note: If the virtual machines do not power on, the process continues and the virtual machines must be manually powered on.
The virtual machines cannot be powered on automatically in a number of situations, such as when there are not enough
resources in the resource pool or the required MAC address is part of a reserved range or there is a MAC address conflict or IP
conflict, for example, if a clone was previously created with the MAC or IP address.
When a vCD vApp is moved to a vCenter Server recovery site, a vCenter Server vCD vApp is created in the recovery site. If
reverse protection was specified, the VPG state is Needs Configuration and the VPG must be recreated by protecting the
virtual machines in the vCD vApp as separate machines and not as part of the vCD vApp.
Conversion considerations for a protected virtual machine in vSphere when it is recovered in Hyper-V:
■ A machine using BIOS is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine using EUFI is recovered in Hyper-V as a Generation 2 virtual machine.
■ A machine with a 32bit operating system is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine with a 64bit operating system is recovered in Hyper-V as either a Generation 1 or Generation 2 virtual machine,
dependent on the operating system support in Hyper-V.
■ The boot disk is ported to a disk on an IDE controller. The boot location is 0:0.
■ A virtual machine using up to 4 SCSI controllers is recovered as a virtual machine with 1 SCSI controller.
■ The virtual machine NICs are recovered with Hyper-V network adapters except for protected Windows 2003 virtual
machines which are recovered with Hyper-V legacy network adapters.
■ When VMware Tools is installed on the protected virtual machine running Windows Server 2012, Integration Services is
installed on the recovered virtual machine automatically.
■ RDM disks are replicated to Hyper-V vhd or vhdx disks, and not to Pass-through disks.
Clicking EDIT VPG displays the Edit VPG wizard with the settings filled in, using the original settings for the virtual machines in
the VPG from the original protected site, except for the volumes, since the last step of the Move operation is to delete the
virtual machines from the original protected site inventory, including the disks. To start replicating the virtual machines in the
VPG, specify the disks to use for replication and optionally, make any other changes to the original settings and click DONE. An
initial synchronization is performed.
Notes:
■ If Keep Source VMs is not selected, and virtual machines or vCD vApp are already protected in several VPGs, the virtual
machines or vCD vApp are deleted from the protected site. This will result in the removal of these virtual machines from
other VPGs that are protecting them and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other
virtual machines are left to protect, the entire VPG will be removed.
Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ You can edit the VPG definition from either of the sites, the site where the VPG virtual machines were initially protected or
the site they were moved to.
■ When reverse protection is specified for a VPG residing on a vCD site that is replicating to either a vSphere or Hyper-V
site, the boot order settings will not reserve the start delay vCD vApp settings for virtual machines with the same order
number.
This section describes how to migrate the Zerto to a new Virtual Machine.
When Zerto is installed, the installation includes the following:
■ Zerto Virtual Manager (ZVM): A Windows service, Zerto Virtual Manager service, that manages the replication at the
site level.
■ Virtual Replication Appliance (VRA): A virtual machine installed on each Hyper-V hosting virtual machines to be
protected or recovered, to manage the replication of data from protected virtual machines to the recovery site.
■ Virtual Backup Appliance (VBA): A Windows service that manages File Level Recovery operations within Zerto. These
repositories can be local or on a shared network.
■ DSS: Installed on the VRA machine, and runs in the same process as the VRA. IT is responsible for all the retention data
path operations.
■ Zerto User Interface: Recovery using Zerto is managed in a browser.
IMPORTANT:
■ The Optional steps that are included in the procedure below are highly recommended.
■ Perform them before connecting the new ZVM to peer ZVM sites, in order to verify that the ZVM on the target VM is
working correctly, and with the correct configurations.
■ If the ZVM on the target VM is not working correctly with the correct configurations, VPGs could be automatically
deleted.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Migrating Zerto to a New Virtual Machine 343
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Migrating Zerto to a New Virtual Machine
7. On the target VM, run the ZVM Installer and complete the installation with the same settings and configurations as the
ZVM that was installed on the source VM.
■ If the ZVM on the source VM was configured to use VCD, and in addition the amqp service was installed, then on the
target VM, the same amqp services must be reinstalled. These are the following:
■ amqp_installer
■ Erlang
■ RabbitMQ
8. On the target VM, stop all Zerto related services:
■ Zerto Virtual Manager Service
■ Zerto Virtual Backup Appliance Service
■ Zerto Remote Log Collection Service
9. (Optional) On the target VM, open the Windows Firewall and configure a new rule to block all outgoing TCP traffic on
ports 9080 and 9081.
10. On the target VM, navigate to the temp folder which you created in 5 and copy the entire Zerto installation folder, then
navigate to the Zerto installation folder which was created when you ran the ZVM installer, and paste and overwrite all
files.
11. On the target VM, navigate to Control Panel > Network and Internet, and set the target VM’s IP address the same IP
address as original IP address of the source VM.
■ If a DNS name was used instead of the IP address, set the target VM’s DNS name the same DNS name as the source
VM.
12. (Optional) If the Log Archiver functionality was configured and in use on the source VM, make sure to create a folder on
the target VM to which the logs are archived.
13. On the target VM, start all Zerto related services:
■ Zerto Virtual Manager Service
■ Zerto Virtual Backup Appliance Service
■ Zerto Remote Log Collection Service
14. (Optional) On the target VM, perform the following optional validations:
a) Open an Internet browser, enter the URL https://localhost:9669, and log into the ZVM.
b) If you blocked all outgoing TCP traffic on ports 9080 and 9081 as described in 9, make sure all the VPGs are present.
Their state should be Error or Site disconnection, as there should be no connection to the peer ZVM sites.
c) Make sure that the VRA status is Installed.
d) Open the Windows Firewall and re-enable traffic for ports 9080 and 9081.
15. From anywhere in the network, log into the ZVM GUI and verify that the status of the VPGs and VRAs is OK.
■ If a DNS name was used instead of an IP address, it might take a while for the correct routing to occur. The sites will
remain with the status disconnected until the correct routing occurs.
16. If the status of all the VPGs and VRAs is OK, first power off and then delete the source VM as it is no longer in use.
344
CHAPTER 18: MANAGING FAILOVER
This section describes how to perform a failover to the recovery site after an unforeseen disaster. The following topics are
described in this section:
■ The Failover Live Process
■ Initiating Failover Live
■ Reverse Protection for a Failed Over VPG
■ What Happens When the Protected Site is Down
■ Initiating Failover Live During a Test
Note: If you need to perform a failover while a retention process is running, first abort the retention process to enable the
failover to run.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing Failover 345
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Managing Failover
■ The default is to automatically commit the Failover operation without testing. However, you can also run basic tests on the
machines to ensure their validity to the specified checkpoint. Depending on the commit/rollback policy that you specified
for the operation, after testing either the operation is committed, finalizing the failover, or rolled back, aborting the
operation.
■ If the protected site is still available, for example, after a partial disaster, and Reverse Protection is possible and specified
for the Failover operation, the protected virtual machines are powered off and removed from the inventory. The virtual
disks used by the virtual machines in the protected site are used for reverse protection. A Delta Sync is performed to
make sure that the two copies, the new target site disks and the original site disks, are consistent. A Delta Sync is
required since the recovered machines can be updated while data is being promoted.
If reverse protection is selected, and the virtual machines or vCD vApp are already protected in other VPGs, continuing
with the operation will cause the virtual machines or vCD vApp to be deleted from other VPGs that are protecting them
and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other virtual machines are left to protect,
the entire VPG will be removed.
If reverse protection is selected, and the virtual machines or vCD vApp are already protected in other VPGs, continuing
with the operation will cause the other VPGs protecting the same virtual machines or vCD vApp to pause the protection.
In the event of vCD vApp or if no other virtual machines are left to protect, the entire VPG will be removed. To resume the
VPGs protection, you must edit the VPGs on the other sites and remove the virtual machine that was failed over from the
protected site.
Note: If reverse protection is not possible, the original protected site virtual machines or vCD vApp are not powered off
and removed.
Protecting virtual machines or a vCD vApp in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ The data from the journal is promoted to the machines. The machines can be used during the promotion and Zerto ensures
that the user sees the latest image, even if this image, in part, includes data from the journal.
Note: Virtual machines cannot be moved to another host during promotion. If the host is rebooted during promotion, make
sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before starting up the
recovered virtual machines.
If Reverse Protection is selected, and the virtual machines or vCD vApp are already protected in other VPGs, continuing
with the operation will cause the other VPGs protecting the same virtual machines or vCD vApp to pause the protection.
In the event of vCD vApp or if no other virtual machines are left to protect, the entire VPG will be removed. To resume the
VPGs protection, you must edit the VPGs on the other sites and remove the virtual machine that was failed over from the
protected site.
Protecting virtual machines or a vCD vApp in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ Any VPGs that are in the process of being synchronized, cannot be recovered, unless the synchronization is a bitmap
synchronization.
■ You cannot protect virtual machines with VMware Fault Tolerance.
To initiate a failover:
1. In the Zerto User Interface set the operation to LIVE and click FAILOVER.
The Failover wizard appears.
The Direction arrow shows the direction of the process: From the protected site To the peer, recovery, site.
3. Click NEXT. If specific VMs are selected for failover, a warning will appear informing the user to review the Pre-recovery
and Post-recovery Scripts.
The EXECUTION PARAMETERS window is displayed.
You can change the following values to use for the recovery:
■ Commit Policy
■ Checkpoint to use
■ Force Shutdown
■ Reverse Protection settings
In this window you can also see if a Boot Order and Scripts are defined for the VPG.
4. By default, the last checkpoint added to the journal is displayed in the Checkpoint column
■ To use this checkpoint, proceed to the next step.
■ To change the checkpoint, click the link that appears as the checkpoint.
a) To commit the recovery operation automatically, with no testing, select Auto-Commit and 0 minutes.
b) Select None if you do not want an automatic commit or rollback. You must manually commit or roll back.
If some VMs in a VPG fail to recover properly and Auto-Commit was selected for the operation, the commit policy will
change to None. You must manually commit or rollback.
c) To test before committing or rolling back, specify an amount of time to test the recovered machines, in minutes.
This is the amount of time that the commit or rollback operation is delayed, before the automatic commit or rollback
action is performed.
During this time period, check that the new virtual machines are OK and then commit the operation or roll it back.
The maximum amount of time you can delay the commit or rollback operation is 1440 minutes, which is 24 hours.
Testing that involves I/O is done on scratch volumes.
■ The more I/Os generated, the more scratch volumes are used, until the maximum size is reached, at which point no
more testing can be done.
■ The maximum size of all the scratch volumes is determined by the journal size hard limit and cannot be changed.
■ The scratch volumes reside on the storage defined for the journal.
8. To specify the shutdown policy, click the VM Shutdown field and select the shutdown policy:
■ No (default): The protected virtual machines are not touched before starting the failover. This assumes that you do
not know the state of the protected machines, or you know that they are not serviceable.
■ Yes: If the protected virtual machines have VMware Tools available, the virtual machines are gracefully shut down,
otherwise the Failover operation fails. This is similar to performing a Move operation to a specified checkpoint.
■ Force Shutdown: The protected virtual machines are forcibly shut down before starting the failover. This is similar to
performing a Move operation to a specified checkpoint. If the protected virtual machines have VMware Tools
available, the procedure waits five minutes for the virtual machines to be gracefully shut down before forcibly
powering them off.
9. To specify reverse protection, whereby the virtual machines in the VPG are failed over to the recovery site and then
protected in the recovery site, back to the original site, either:
■ Click REVERSE PROTECT ALL. This activates reverse protection on all the VPGs and/or VMs that you plan to failover.
The system default values for this procedure will be assigned to all the VPGs.
- Or -
■ Click the Reverse Protection field and select SET.
a) To configure the VPG for reverse protection, click the REVERSE link.
The Edit Reverse VPG wizard is displayed.
You can edit the reverse protection configuration. The parameters are the same as described when you create a VPG,
described in “Protecting Virtual Machines from a vCenter Server”, on page 45, with the following differences:
■ You cannot add or remove virtual machines to the reverse protection VPG.
■ By default, reverse protection is to the original protected disks. You can specify a different storage to be used for
the reverse protection.
■ If VMware Tools is available, for each virtual machine in the VPG, the IP address of the originally protected virtual
machine is used. Thus, during failback the original IP address of the virtual machine on the site where the machine
was originally protected is reused. However, if the machine does not contain the utility, DHCP is used.
■ The host version must be 4.1 or higher for re-IP to be enabled.
IMPORTANT:
■ The virtual machines or vCD vApp will be removed from the other VPGs that are protecting them if the following
conditions apply:
■ The virtual machines or vCD vApp are already protected in other VPGs
■ Reverse protection is specified
■ If your VPG has a vCD vApp, or if there are no other virtual machines left to protect, the entire VPG will be removed.
■ If Reverse Protection is selected, and the virtual machines or vCD vApp are already protected in other VPGs,
continuing with the operation will cause the other VPGs protecting the same virtual machines or vCD vApp to pause
the protection. In the event of vCD vApp or if no other virtual machines are left to protect, the entire VPG will be
removed. To resume the VPGs protection, you must edit the VPGs on the other sites and remove the virtual machine
that was failed over from the protected site.
Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
When committing the failover, you can reconfigure reverse protection, regardless of the reverse protection settings
specified here.
When reverse protection is specified for a VPG residing on a vCD site that is replicating to either a vSphere or Hyper-V
site, the boot order settings will not reserve the start delay vCD vApp settings for virtual machines with the same order
number.
10. Click NEXT.
■ A warning appears informing the user that the virtual machines or vCD vApp will be removed from the other VPGs
that are protecting them.
■ If your VPG has a vCD vApp, or if there are no other virtual machines left to protect, the entire VPG will be removed.
11. Click OK. If a virtual machine is deleted from other VPGs, the journals of these VPGs are reset.
The FAILOVER step is displayed. The topology shows the number of VPGs and virtual machines being failed over to each
recovery site. In the following example, 2 VPGs will be failed over to Site6-Ent2-R2, and they contain 5 virtual machines;
and 1 VPG will be failed over to Site5-Ent2-P2-R2 and it contains 2 virtual machines.
If a commit policy was set with a timeout greater than zero, you can check the failed over virtual machines on the recovery
site before committing the failover operation.
The failover starts by creating the virtual machines in the recovery site to the point-in-time specified: either the last data
transferred from the protected site or to one of the checkpoints written in the journal.
Note: If a virtual machine exists on the recovery site with the same name as a virtual machine being failed over, the
machine is created and named in the peer site with a number added as a suffix to the name, starting with the number 1.
If the original protected site is still up and reverse protection is configured to use the protected virtual machines virtual
disks, these virtual machines are powered off.
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the failover operation, is written to thin-provisioned
scratch virtual disks. These virtual disks are automatically defined when the machines are created on the recovery site for
testing. The longer the test period the more scratch volumes are used, until the maximum size is reached, at which point no
more testing can be done. The maximum size of all the scratch volumes is determined by the journal size hard limit and
cannot be changed. The scratch volumes reside on the same datastore defined for the journal. Using these scratch
volumes makes committing or rolling back the failover operation more efficient.
Note: You cannot take a snapshot of a virtual machine before the failover operation is committed and the data from the
journal promoted to the moved virtual machine disks, since the virtual machine volumes are still managed by the VRA and
not directly by the virtual machine. Using a snapshot of a recovered machine before the failover operation has completed
will result in a corrupted virtual machine being created.
14. Check the virtual machines on the recovery site, then either:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Or, in the specific VPG tab, click the Commit or Rollback icon ( ).
a) If you clicked the Commit icon, the Commit window is displayed to confirm the commit and, if necessary set, or reset,
the reverse protection configuration.
■ If the protected site is still up and you can set up reverse protection, you can reconfigure reverse protection by
selecting the Reverse Protection checkbox and then click the Reverse link.
■ Configuring reverse protection at this point overwrites any of settings defined when initially configuring the move.
■ If specific VMs in a VPG are selected, a new VPG will be created in addition to the original VPG. The additional
VPG includes only the VMs selected for recovery. The new VPG name is displayed as {Original-VPG-Name-
Partial}. The original VPG will remain intact with its history.
■ If some VMs in a VPG fail to recover properly, a warning will appear informing the user which VMs failed to
recover entirely and which recovered without their complete settings. The user will be prompted to proceed or roll
back the VMs which failed to recover. If you choose to proceed, a new VPG will be created in addition to the
original VPG. The additional VPG includes only the VMs that were recovered successfully. The new VPG name is
displayed as {Original-VPG-Name-Partial}.
Note: {Original-VPG-Name-Partial} is only created in cases where some VMs in a VPG fail to recover entirely.
b) If you clicked the Rollback icon, this rolls back the operation, removing the virtual machines that were created on the
recovery site and reboots the machines on the protected site.
The Rollback window is displayed to confirm the rollback.
a) You can also commit or roll back the operation via the TASKS popup window in the status bar, or by selecting
MONITORING > TASKS.
If the original protected site is still up and reverse protection is configured to use the virtual disks of the protected virtual
machines, these virtual machines are removed from this site, unless the original protected site does not have enough
storage available to fail back the failed over virtual machines. Finally, data is promoted from the journal to the recovered
virtual machines.
IMPORTANT:
■ If Reverse Protection is selected and the virtual machines or vCD vApp are already protected in other VPGs, the
virtual machines or vCD vApp are deleted from the protected site and the journals of these VPGs are reset.
This will result in the removal of these virtual machines from other VPGs that are protecting them, or the removal of
the entire VPG, in the event of vCD vApp or if no other virtual machines are left to protect.
■ If Reverse Protection is selected, and the virtual machines or vCD vApp are already protected in other VPGs,
continuing with the operation will cause the other VPGs protecting the same virtual machines or vCD vApp to pause
the protection.
In the event of vCD vApp or if no other virtual machines are left to protect, the entire VPG will be removed. To resume
the VPGs protection, you must edit the VPGs on the other sites and remove the virtual machine that was failed over
from the protected site.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
During promotion of data, you cannot move a host on the recovered virtual machines. If the host is rebooted during
promotion, make sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before
starting up the recovered virtual machines.
By default the virtual machines are started with the same IPs as the protected machines in the protected site. If you do not
specify Reverse Protection, the original machines still exist in the protected site and this can create clashes. In this case,
Zerto recommends ensuring that a different IP is assigned to the virtual machines when they start, when configuring each
virtual machine NIC properties in the VPG, during the definition of the VPG. For details, refer to
“Protecting Virtual Machines from a vCenter Server”, on page 45. If you have defined the new virtual machines so that they
will be assigned different IPs, the re-IP cannot be performed until the new machine is started. Zerto changes the machine
IPs and then reboots these machines with their new IPs.
Note: If the virtual machines do not power on, the process continues and the virtual machines must be manually powered
on. The virtual machines cannot be powered on automatically in a number of situations, such as when there is not enough
resources in the resource pool or the required MAC address is part of a reserved range or there is a MAC address conflict
or IP conflict, for example, if a clone was previously created with the MAC or IP address.
When a vCD vApp is failed over to a vCenter Server recovery site, a vCenter Server vCD vApp is created in the recovery
site. If Reverse Protection was specified, the VPG state is Needs Configuration and the VPG must be recreated by
protecting the virtual machines in the vCD vApp as separate machines and not as part of the vCD vApp.
Conversion considerations for a protected virtual machine in vSphere when it is recovered in Hyper-V:
■ A machine using BIOS is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine using EUFI is recovered in Hyper-V as a Generation 2 virtual machine.
■ A machine with a 32bit operating system is recovered in Hyper-V as a Generation 1 virtual machine.
■ A machine with a 64bit operating system is recovered in Hyper-V as either a Generation 1 or Generation 2 virtual machine,
dependent on the operating system support in Hyper-V.
■ The boot disk is ported to a disk on an IDE controller. The boot location is 0:0.
■ A virtual machine using up to 4 SCSI controllers is recovered as a virtual machine with 1 SCSI controller.
■ The virtual machine NICs are recovered with Hyper-V network adapters except for protected Windows 2003 virtual
machines which are recovered with Hyper-V legacy network adapters.
■ When VMware Tools is installed on the protected virtual machine running Windows Server 2012, Integration Services is
installed on the recovered virtual machine automatically.
■ RDM disks are replicated to Hyper-V vhd or vhdx disks, and not to Pass-through disks.
■ Clicking EDIT VPG displays the Edit VPG wizard with the settings filled in, using the original settings for the virtual
machines in the VPG from the original protected site, except for the volumes. To start replicating the virtual machines in
the VPG, specify the disks to use for replication and optionally, make any other changes to the original settings and click
DONE.
VPGs enter a state of pause and pause replication if the following conditions apply:
■ The ZVM on the protected and recovery sites are of version 5.5 and higher.
■ The VRA installed on the recovery site is of version 5.5 and higher.
Protecting virtual machines or a vCD vApp in several VPGs is enabled if:
■ The protected site and the recovery site are of version 5.0 and higher
■ The VRAs installed on these sites are of version 5.0 and higher.
You can create a clone of each virtual machine in a VPG. The clone is a copy of the protected virtual machine, located on the
recovery site, while the virtual machine on the protected site remains protected and live.
The following topics are described in this section:
■ “The Clone Process”, below
■ “Cloning Protected Virtual Machines to the Remote Site”, on page 355
Note: You cannot clone virtual machines in a VPG test while a retention process is running. When the recovery site is vCD, the
clone is created in vCenter Server and the virtual machines have to be manually imported into vCD.
To clone a VPG:
1. In the Zerto User Interface, in the VPGs tab click the name of the VPG to be cloned.
A new tab is added to the Zerto User Interface, with the name of the VPG that you clicked. The tab displays data about the
VPG.
Note: If the VPG was previously viewed, and the tab for this VPG is still displayed, you can access the details by selecting
the tab.
2. Select the new tab and click MORE > Offsite Clone.
The {VPG-Name}: Offsite Clone dialog is displayed.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Cloning a VPG to the Recovery Site 355
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Cloning a VPG to the Recovery Site
■ When a failover test was previously performed on the VPG that includes the virtual machine.
■ When the virtual machine was added to an existing VPG after the added virtual machine was synchronized.
6. To use a checkpoint which is not the latest checkpoint, or the latest tagged checkpoint, choose Select from all available
checkpoints. By default, this option displays all checkpoints in the system. You can choose to display only automatic, or
tagged checkpoints, or any combination of these types.
7. Click OK.
8. Select the recovery datastore to use for the cloned virtual machines.
Note: All the cloned virtual machines use a single datastore, that is accessible by all the recovery site VRAs used by the
VPG. In a vCD environment the datastore is selected from the list of available datastores that is accessible by all the
recovery site VRAs and that has the most free space.
9. Click CLONE.
The cloning starts and the status is displayed in the VPG details tab.
The cloned machines are assigned the names of the protected machines with the addition of the timestamp of the checkpoint
used for the clone. The cloned virtual machines are not powered on.
When cloning to VMware vSphere environments:
■ The cloned virtual machines are created in the ZertoRecoveryFolder folder, and not the recovery folder defined in the
VPG.
■ The cloned virtual machines use a single datastore.
■ The VMDKs are renamed (1).vmdk, (2).vmdk, etc.
■ When the recovery site is VMware vCloud Director, the clone is created in vCenter Server and the virtual machines have to
be manually imported into vCD.
■ If the protected virtual machine has RDMs attached, these disks are always cloned as thin-provisioned VMDKs to the
datastore specified in the Recovery Datastore field in the Edit VM dialog in the REPLICATION step in the Edit VPG
wizard.
When cloning to Microsoft Hyper-V environments:
■ The cloned virtual machines use a single storage.
■ The VHDs are renamed (1).vhdx, (2).vhdx, etc.
You can recover specific files and folders from the recovery site for virtual machines that are being protected by Zerto. You can
recover the files and folders from a specific point-in-time. Thus, you can recover files and folders for a virtual machine for as far
back as the journal history is configured.
This section describes how to recover files and folders. The following topics are described in this section:
■ “The File and Folder Recovery Process”, below
■ “Recovering Files and Folders”, on page 359
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Recovering Files and Folders 358
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Recovering Files and Folders
Mounting the Disk that Contains the Required Files and Folders
Before you can recover files or folders, you must first select the checkpoint in time from which you will recover the files or
folders. Then you must select and access the disk in which the files or folders are contained.
The list of all protected virtual machines is displayed. You can only recover files or folders from one virtual machine at a
time.
2. Select the virtual machine on which the file or folder is located and click NEXT.
The MOUNT summary step is displayed. The settings you selected are displayed.
7. Continue with “Downloading the Files and Folders from the Disk” on page 362.
2. Click NEXT.
3. Click NEXT.
The DOWNLOAD step is displayed. It shows the files and folders you selected for downloading.
By default, when you select multiple files or one or more folders, the data is compressed before it is downloaded. If you
select only one file, for download, you can choose whether or not the file is compressed.
Note:
If you are upgrading Zerto, and if your site was already configured with Long Term Retention, or retention
configurations, review Long Term Retention known issues and limitations, and see the guide, Upgrading Zerto Virtual
Replication.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Using Zerto’s Long Term Retention 365
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Using Zerto’s Long Term Retention
■ In some scenarios, the retention process will wait in queue and will start running only on the following day, resulting in
two retention sets on the same day.
■ Sync from Repository:
■ Restoring VPGs is allowed for VPGs which currently exist, or which were deleted.
■ Restoring previously created retention sets, which were created before the Repository was created, from a previously
populated 6.5 Repository which has been added to the 7.0 system is not supported.
■ Restoring from a Repository containing retention sets, which were created prior to adding the repository to the
system, is not supported.
■ Reconnecting a Repository is not supported.
■ Attaching an existing Repository and leveraging copies for the next incremental is not supported. Therefore, any
Repository is considered new after defining it and a complete reading of the repository will be performed.
■ Search and Restore:
■ ZVM minimum requirements for performing Search and Restore: at least 4 vCPUs and 10GB RAM.
■ Saving indexed meta-data is currently only supported on SMB Repositories which are not PBBA based.
■ When configuring SMB repositories used for indexing, do not use a local user account.
■ Operating Systems, File Systems and Volume Manager that Zerto can index:
■ Operating Systems: Windows Vista and 2008 server and above and Linux
■ File System and Volume Manger: NTFS and EXT2/EXT3/EXT4
■ LVM is not supported for indexing
■ A VM with over 100 million entries (files or folders) cannot be indexed.
■ Rate of entries (files or folders) indexed in NTFS per second: 2000 files.
■ Rate of entries (files or folders) indexed in EXT per second: 1500 files.
■ Supported partitioning methods: GPT, MBR.
■ Zerto can index up to 3 VMs in parallel and no more than one per recovery host.
■ Search and Restore is available only from a recovery ZVM GUI.
■ While indexing, only a Failover operation is allowed and this will stop the indexing process (indexing cannot be
resumed).
■ Modified date: displayed in the browser local time.
■ Search is not case sensitive.
■ Support only search according to entry name (not full path).
■ If the user does not configure a Repository for indexing and indexing starts after the retention process, no alert will be
displayed to notify the user that indexing has not happened.
■ No multi-tenancy support.
■ Search and Restore requires Enterprise Cloud Edition, Cloud One2Many or NFR/Trial license.
■ If a VM with a Retention policy set has 2 disks with the same name, the 2 disks cannot be restored to the same
datastore.
■ Licensing:
■ Long Term Retention requires Enterprise Cloud Edition, Cloud One2Many or NFR/Trial license.
■ Error Handling:
■ Certain failures when running retention sets may require Support intervention to re-enable them.
■ Performance:
■ DSS and VRA consume CPU. As such, if the CPU on the VRA reaches high consumption rates, another CPU should be
added to the VRA machine. Adding additional CPUs on top of the additional one is redundant and the additional CPUs
will not be utilized.
■ Manual Retention Processes:
■ If the scheduled retention process on that day has already executed, manual retention will either run the last settings
used, or run a default of 90 days incremental.
■ Cloud Service Providers and Zerto Cloud Manager Users:
■ Extended Recovery" Service profiles are not supported.
■ Other:
■ Partial retention processes (e.g. some volumes have succeeded and others have not) and Restores are not supported.
■ When editing a VPG where the protected site is 6.5Ux, and the recovery site is 7.0, the user will not be able to see
updated scheduling settings. Any scheduling configuration done on the 6.5 GUI will be ignored.
■ Long Term Retention is not supported where the protected or recovery site is a Public Cloud. Therefore, the SETUP tab
in the ZCA was removed.
■ Only one Long Term Retention task can run on a VPG concurrently.
To edit a Repository:
1. In the Zerto User Interface, click SETUP tab, REPOSITORIES sub-tab.
2. Select the Repository to edit and click MORE > Edit.
The Edit Repository window is displayed.
Deleting a Repository disconnects it from the Zerto. When a Repository is deleted, the retentions set can no longer be restored
or found through a Search operation.
To delete a Repository:
1. In the Zerto User Interface, click SETUP tab, REPOSITORIES sub-tab.
2. Select the Repository to delete and click MORE > Delete.
3. A warning message appears informing the user that the retention sets in that Repository will no longer be restorable.
4. Click OK to delete the Repository.
Note:
Long Term retention is not available when the VPG is recovered to a Public Cloud.
Note:
When needed, you can manually run the retention process ad hoc. See Manually Running the Retention Process
Requirements
■ Verify that a Repository was created where the retention sets will be saved. Repositories are created and configured via the
SETUP tab as described in Creating a New Repository for Retention.
■ When using Long Term Retention, the VRA should be configured with 2 vCPUs.
Long Term Retention can be enabled at the same time when you first create the VPG to protect virtual machines.
You can also enable Long Term Retention by editing an existing VPG.
10. Toggle the Weekly or Yearly retentions from OFF to ON. The default retention settings for Schedule, Type and Keep For
appear. The retention setting Keep For is the length of time to keep the retention sets. For details of how this affects the
number of retention sets saved, see Storing Retention Sets.
Note: Daily or Weekly retentions must be configured. Weekly or Monthly retentions must be configured to Full.
11. If you do not want to use the default settings, click the edit icon next to each retention setting and configure the following:
SETTING & DESCRIPTION SELECT...
Daily
Click the edit icon. The Daily Retention window is displayed ■ Run at: The time set to run all retention processes.
This field cannot be edited from the Daily
Retention window.
■ Keep For: Define the number of days to keep the
Daily Retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
.
Weekly
Click the edit icon. The Weekly Retention window is displayed. ■ Every: Run a retention process every selected day
of the week.
■ Type: Select Full or Incremental from the drop-
down menu.
■ Full: All the data is copied to the Repository.
■ Incremental: Only the changes from the last
retention process are copied.
■ Run at: The time set to run all retention processes.
This field cannot be edited from the Weekly
Retention window.
■ Keep for: Define the number of weeks to keep the
Weekly retentions. A rotation of the retention
process will be performed to enforce the
predefined retention.
After initializing the VPG, Zerto periodically checks that the schedule to run a retention process has not passed. At the
scheduled retention process time, the job is run and the retention set is stored in the specified Repository.
At any time, you can decide that you need to run the retention process, without waiting for the scheduled time. Use the
following procedure to do this.
TIP
In this window you can also create a new Repository by clicking NEW REPOSITORY.
By default, the GENERAL view is selected. In addition to filtering and sorting of columns, you can click RUN DETAILS to view
information on the retention processes sessions.
RETENTION STATUS tab, VPGs Sub-tab - GENERAL View
RETENTION STATUS tab, VPGs Sub-tab - RUN DETAILS View
Click the configuration icon ( ), then click Show/Hide Columns to display a window with a list of additional columns which
can be added to the view.
Repository Site: The site where the VPG is retained. The retention sets are stored on a network shared resource
which is accessible from this site.
Status: The status of the job: Running or Scheduled.
ZORG: A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager
Administration Guide.
No. of Volumes: The number of volumes protected by the VPG.
Repository Name: The name of the Repository where the retention set is stored.
Protected Site: The name of the site.
Last Run Size: The size of the last retention set performed by Zerto Virtual Manager.
VPG Size: The size of the VPG in the last run, which is stored on disk.
Restore Points: The restore points for the retention sets out of the total retention sets run for the VPG.
No. of VMs: The total number of virtual machines protected by the VPG.
MORE Options
Click MORE > Stop Retention Process to abort a running job. Any virtual machine volumes already stored in the repository are
not removed and the job status is partial if there are any stored volumes.
Click MORE > Run Retention Process to start a job for a selected VPG, outside of the schedule for that VPG.
Click the configuration icon ( ), then click Show/Hide Columns to display a window with a list of additional columns which
can be added to the view.
VPG Name:
Repository Site: The site where the VPG is restored. The retention sets are stored on a network shared resource
which is accessible from this site.
Repository Name: The name of the Repository where the retention sets are to be stored.
ZORG: A name given to an organization by a cloud service provider. For details refer to Zerto Cloud
Manager Administration Guide.
Status: The status of the retention set: Running or Scheduled.
Last Run Size: The size of the last retention set performed by Zerto Virtual Manager.
VM Size: The size of the VM in the last run, which is stored on disk.
Restore Points: The restore points for the retention sets out of the total retention sets run for the VPG.
# of Volumes: The number of volumes associated with the VM.
3. Choose an SMB Repository from the Indexing Repository drop-down menu. You can change the indexing Repository to a
different SMB Repository at any point. The change will affect only future file system indexing operations. Any previously
created indexes will still be enabled for Search by Zerto as long as the Repository is configured under Setup > Repositories.
The SMB Repository selected as the indexing Repository cannot be deleted from the Setup > Repositories list. In order to
delete, make sure to first set a different SMB Repository for indexing or select None.
Selecting None from the indexing Repository menu will cause all subsequent file system indexing operations to fail. In that
case, disable file system indexing from any VM currently selected for indexing.
4. Click APPLY or SAVE.
Indexing Execution
The index will run after the retention process for all the VMs in the VPG had completed successfully. The indexing task is
automatically created and can be stopped manually by going to Tasks > Abort.
Only VMs that were successfully indexed appear in the VM in a VPG search field.
2. You can specify the following values, which are then applied to the Search:
■ VM in VPG: Type the name of the virtual machine.
■ Retention Set Specify the date range of the search. The default range is the last 7 days.
Date:
■ File/folder Type the file or folder name to search for. You can use the wildcard * at the end, middle or the
name: beginning of a word.
3. Click the Search Icon.
The Search results appear. The Search is limited to 500 results at a time.
The Search results specify the name of the file or folder and the path.
4. Select the file or folder. A list of revisions of that file or folder is displayed according to the retention set date previously
selected.
The revisions display a list of restore points of the retention sets. The revisions view specifies the following:
■ Date Modified: The date in which the file or folder was modified.
■ Retention Set The date of the restore point.
Date:
■ Size: The size of the file. The size of a folder is not displayed.
■ Actions: Select either Restore VM or Restore VPG.
5. Choose a restore point and click the Restore VM or Restore VPG icon.
The Restore window is displayed on the VM SETTINGS step.
8. To change the host or datastore information for several virtual machines at the same time, select the virtual machines and
click EDIT SELECTED.
The Configure VM Settings window is displayed.
If one or more of the volumes which was retained, was deleted after the retention set was created, or if one of the volumes
failed, the entire retention process for that VM will fail.
You can specify the following values, which are then applied to all the selected virtual machines:
■ Restore on Host: The IP address of the host where you want the virtual machines restored.
■ Restore on Datastore: The datastore to use for the restored virtual machine files.
■ Power On: Select this if you want the restored virtual machines to be powered on.
- Or -
Alternatively, you can use the recovery host and storage specified for each virtual machine in the VPG definition by clicking
APPLY VPG CONFIGURATION.
9. To specify the volume information for each virtual machine, from the Actions column, click Volumes.
10. To edit information in a field, click the field and update the information.
11. To edit information for several datastores at the same time, select the datastores and click EDIT SELECTED.
The Edit Selected Volumes dialog is displayed.
15. To edit information in one field, click the field and update the information.
16. To edit information for several virtual NICs at the same time, select the NICs and click EDIT SELECTED.
The Edit NIC dialog is displayed.
■ Change vNIC IP Whether or not to keep the default virtual NIC (vNIC) IP configuration.
Configuration:
You can only change the vNIC IP after the restore has completed with VMware Tools
installed.
■ If you select a static IP connection, you must set the IP address, subnet mask, and
default gateway. Optionally, change the preferred and alternate DNS server IPs and
the DNS suffix.
■ If you select DHCP, the IP configuration and DNS server configurations are assigned
automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ IP Address: The IP for the restored virtual machine. This can be the same IP as the original protected
virtual machine.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default mask for the network.
■ Preferred DNS Server: The IP address of the primary DNS server to handle Internet protocol mapping.
■ Alternate DNS Server: The IP address of the alternate DNS server.
■ DNS Suffix: The DNS name excluding the host.
18. Click OK.
19. Click DONE.
20. Click NEXT.
The SUMMARY step is displayed. Review the details of the restore.
21. If this is the retention set which you want to restore, click RESTORE.
The virtual machines are created from the Repository at the recovery site.
To restore a VPG:
1. In the Zerto User Interface select ACTIONS > RESTORE.
The Restore wizard is displayed.
The RESTORE SETTINGs step appears, displaying all the available retention sets.
4. From the list of available retention sets, select the retention set to restore, where:
■ Point in Time: The date and time the retention set was performed.
■ Restore Site: The recovery site for the VPG.
■ VMs: The number of virtual machines with retention, out of the total number of virtual machines.
■ Volumes: The number of volumes with retention, out of the total number of volumes for the virtual machines.
■ Repository: The name of the repository where the retention set is stored.
■ ZORG: (ZCM sites only) The Zerto organization for which the retention set was created. This field only has a
value if the Zerto Cloud Manager is connected to the site. For details, see Zerto Cloud Manager
Administration Guide.
5. When you select a retention set to restore, the list of virtual machines in the retention set appear, displaying the following
information:
VM Name: The name of the virtual machine.
# Volumes Retained: The number of volumes retained, out of the total number of volumes for the virtual machine.
6. If the restore site has the option to restore to vCD, select where to attach the restored VMs, either to VC or vCD.
7. Click NEXT.
The VM SETTINGS step is displayed.
The list of virtual machines that can be restored is displayed.
8. You can specify the following which are then applied to all the virtual machines to be restored:
■ Restore on Host: The IP address of the host where you want the VPG restored.
After selecting a host, the Restore on Datastore field is displayed.
■ Restore on Datastore: The datastore to use for the restored VPG files.
- Or -
■ Alternatively, you can use the recovery host and storage specified for each virtual machine in the VPG definition by
clicking APPLY VPG CONFIGURATION. To use this option, the VPG must still be available.
9. To change the information in a field, click the field and update the information.
10. To change the host or datastore information for several virtual machines at the same time, select the virtual machines and
click EDIT SELECTED.
The Configure VM Settings window is displayed.
If one or more of the volumes which was retained, was deleted after the retention set was created, or if one of the volumes
failed, the entire retention process for that VM will fail.
You can specify the following values, which are then applied to all the selected virtual machines:
■ Restore on Host: The IP address of the host where you want the virtual machines restored.
■ Restore on Datastore: The datastore to use for the restored virtual machine files.
■ Power On: Select this if you want the restored virtual machines to be powered on.
- Or -
Alternatively, you can use the recovery host and storage specified for each virtual machine in the VPG definition by clicking
APPLY VPG CONFIGURATION.
11. To specify the volume information for each virtual machine, from the Actions column, click Volumes.
12. To edit information in a field, click the field and update the information.
13. To edit information for several datastores at the same time, select the datastores and click EDIT SELECTED.
The Edit Selected Volumes dialog is displayed.
17. To edit information in one field, click the field and update the information.
18. To edit information for several virtual NICs at the same time, select the NICs and click EDIT SELECTED.
The Edit NIC dialog is displayed.
■ Change vNIC IP Whether or not to keep the default virtual NIC (vNIC) IP configuration.
Configuration:
You can only change the vNIC IP after the restore has completed with VMware Tools
installed.
■ If you select a static IP connection, you must set the IP address, subnet mask, and
default gateway. Optionally, change the preferred and alternate DNS server IPs and
the DNS suffix.
■ If you select DHCP, the IP configuration and DNS server configurations are assigned
automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ IP Address: The IP for the restored virtual machine. This can be the same IP as the original protected
virtual machine.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default mask for the network.
■ Preferred DNS Server: The IP address of the primary DNS server to handle Internet protocol mapping.
■ Alternate DNS Server: The IP address of the alternate DNS server.
■ DNS Suffix: The DNS name excluding the host.
20. Click OK.
21. Click DONE.
22. Click NEXT.
The SUMMARY step is displayed. Review the details of the restore.
23. If this is the retention set which you want to restore, click RESTORE.
The virtual machines are created from the Repository at the recovery site.
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Zerto Reports 393
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Zerto Reports
Recovery Reports
Information about recovery operations — failover tests, moves, and failovers — can be displayed in Recovery Reports under the
REPORTS tab.
The information includes the name of the user who initiated the report, which recovery operation, the point in time , protected
and the recovery sites involved, when the recovery operation was started, when it ended, the time it took to bring up the
machines in the recovery site, the RTO, whether the operation succeeded or not, the VPG recovery settings, the virtual
machine recovery settings, and detailed recovery steps, and any notes added during a failover test
Recovery Reports are always kept, and never deleted.
Resources Report
Information about the resources used by the virtual machines being recovered to a particular site is displayed in the Resources
report under the REPORTS tab. The information is collected at fixed times that are defined in the Reports tab of the Site
Settings dialog in the recovery site. Information for the report is saved for 90 days when the sampling period is hourly and for
one year when the sampling period is daily.
The report collects the resource information for the virtual machines being recovered to the site where the report is run.
If no virtual machines are recovered to the site where the report is run, the report is empty.
You can filter the information by the following:
From and To: The dates for which you want information.
Click EXPORT to generate the report, which is produced as an Excel file.
The information presented in this report is divided into three tabs:
Details Tab: Shows information for each protected virtual machine.
Performance Tab: Shows bandwidth and throughput information for each virtual machine in a table and in a graph.
Target Host Tab: Shows information per host in the recovery site.
Details Tab
The Details tab includes the names and IDs of the virtual machines being protected and, for each virtual machine, the
timestamp for the information, where it is protected, the CPU used, the memory used by the host and the guest, the storage
used, and other information.
■ If valueInLastSample does not exist, since currentValue is the first sample for the virtual machine, the data is not
calculated.
Bandwidth is calculated as: (currentValue – valueInLastSample)/elapsedTtime
For example:
TIME ACTION/DESCRIPTION
2:29:59.999 A virtual machine is placed in a VPG
2:30 A sample is generated. The total transmitted bytes is zero since the virtual machine was just placed in the
VPG
2:30-2:59.999 The VM is writing data at 1MB/minute
3:00 The virtual machine lowers its write rate to 0.5MB/minute
3:30 A new sample is calculated. Current value of total data transmitted is 45MB:
1MB/minute)*(30 minutes) + (0.5MB/minute)*(30 minutes)
Last value of total data transmitted is 0, from the 2:30 sample.
Bandwidth = (45MB-0)/(60 minutes) = 0.75MB/minute = 13107Bps
PARAMETER DESCRIPTION
Recovery Volumes Provisioned The amount of provisioned storage for the virtual machine in the target site. This
Storage (GB) value is the sum of volumes’ provisioned size.
Recovery Volumes Used Storage (GB) The amount of storage used by the virtual machine in the target site.
Service Profile The service profile used by the VPG.
Source Cluster The source cluster name hosting the virtual machine.
Source Host The source host name hosting the virtual machine.
Source Organization VDC The name of the source vDC organization.
Source Resource Pool The source resource pool name hosting the virtual machine.
Source Site The source protected site name, defined in the Zerto User Interface.
Source vCD Organization The name of the source vCD organization.
Source Volumes Provisioned Storage The amount of provisioned storage for the virtual machine in the source site. This
(GB) value is the sum of volumes’ provisioned size.
Source Volumes Used Storage (GB) The amount of storage used by the virtual machine in the source site. This value is the
sum of the volumes’ used size.
Source VRA Name The name of the source VRA used to send data to the recovery site.
Target Cluster The target cluster name hosting the virtual machine.
Target Datastores The target storage used by the virtual machine if it is recovered.
Target Host The target host name hosting the virtual machine when it is recovered.
Target Organization vDC The name of the target vDC organization.
Target Resource Pool The target resource pool name where the virtual machine will be recovered.
Target Site The target site name, defined in the Zerto User Interface.
Target Storage Policy The target vCD storage policy used.
Target vCD Organization The name of the target vCD organization.
Target VRA Name The name of the VRA managing the recovery.
Throughput (Bps) The average throughput of the VM used between two consecutive samples, in bytes
per second.
Timestamp The date and time the resource information was collected. The value can be
converted to an understandable date using code similar to the following:
var date = new Date(jsonDate);
or code similar to the Perl code example, jsonDateToString($), described in Zerto
Virtual Replication RESTful API Reference Guide.
VM Hardware Version The VMware hardware version.
VM Id The internal virtual machine identifier.
VM Name The name of the virtual machine.
VPG Name The name of the VPG.
VPG Type The VPG type:
VCVpg: VMware vCenter Server
VCvApp: Deprecated
VCDvApp: VMware vCloud Director vApp
PublicCloud: Amazon WebServices or Microsoft Azure
HyperV: Microsoft SCVMM
ZORG The name assigned to an organization using a cloud service provider for recovery. The
name is created in the Zerto Cloud Manager. For details, see the Zerto Cloud Manager
Administration Guide.
Performance Tab
The Performance tab shows bandwidth and throughput information for each virtual machine per sampling period in a table and
in a graph. The Performance tab enables the user to view the total bandwidth and throughput per sampling period.
The graph allows the user to view performance trends over time per VM.
For full explanation of the bandwidth and throughput information, refer to the “Details Tab”, on page 397.
You can filter information by date and VM name.
The following describes the fields in the Performance tab:
PARAMETERS DESCRIPTION
Time Stamp For explanation see the Details tab.
Bandwidth (Bps) The average bandwidth of the VM used between two consecutive samples, in bytes
per second.
Throughput (Bps) The average throughput of the VM used between two consecutive samples, in
bytes per second.
Total Bandwidth The total bandwidth of all VMs during the measured period.
Total Throughout The total throughput of all VMs during the measured period.
For each month, the usage report displays the number of virtual machines protected during the month and the average number
per day in the month. For example, if fifteen virtual machines are protected in a few VPGs starting on the 28th of the month in a
thirty day month, the total days will be 30 (two days multiplied by fifteen machines) and the VM Count will be 1 (Total days
divided by the number of days in the month).
Click EXPORT to a CSV or ZIP file to generate the report.
The ZIP file option saves the report as a zipped CSV file in a zipped file called UsageReport.zip.
You can handle problems related to the WAN connecting the protecting or recovery sites, or other problems using a variety of
diagnostic and troubleshooting tools.
The following topics are described in this chapter:
■ “Ensuring the Zerto Virtual Manager is Running”, below
■ “Troubleshooting Needs Configuration Problems”, on page 402
■ “Troubleshooting GUI Problems”, on page 403
■ “Troubleshooting VRA Problems”, on page 403
■ “Handling Lack of Storage Space for Recovered Virtual Machines”, on page 403
■ “Zerto Virtual Replication Diagnostics Utility”, on page 404
■ “Collecting Zerto Logs”, on page 404
■ “Re-IP Configured As Static Fails During FOL with Reverse Protection”, on page 411
For details about Zerto Virtual Manager alarms, alerts, and events, refer to Zerto Guide to Alarms, Alerts and Events.
The following scenarios result in the VPG status changing to Needs Configuration:
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Troubleshooting 402
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Troubleshooting
■ A protected disk resize operation fails, for example when there is not enough disk space.
■ When a volume is added to a protected virtual machine and the added volume has no matching storage or not enough
room on the recovery storage.
■ When a volume is added to a protected virtual machine and the VPG settings are not updated because of a site
disconnection or a vCenter Server error. In some situations, after the sites reconnect, the state corrects itself
automatically.
■ When performing a Failover or Move operation, if you do not specify reverse protection.
■ An Org vDC network is removed from the recovery site that has a VPG replicating to it.
1. In the Zerto User Interface, click SETTING ( ) in the top right of the header and select Remote Support.
The Remote Support dialog is displayed.
2. Click the drop down menu to display the remote log collection options.
3. Select the remote log collection option you wish to allow:
■ Never: Remote log collection is not allowed (default). If remote log collection is currently allowed, the remote
connection will be terminated if you select this option.
■ For the next 30 days: Remote log collection is allowed. This permission will automatically terminate in 30 days unless
terminated by selecting the Never option.
■ Only for the duration of a specific case: You will be prompted to select the Case number from the drop-down list. The
list contains all the active cases opened under the account that the Zerto Virtual Manager is registered to.
Remote log collection will be allowed for as long as the case is active or until remote log collection is terminated by
selecting the Never option.
4. Click Save.
2. Select the Collect the Zerto Virtual Replication logs for use by Zerto support option.
3. Click Next.
5. Select any alerts that need analyzing from the list and click Next.
6. Select the VPGs that you want analyzed and click Next.
The Customize dialogs are displayed. These dialogs can generally be left with their default values.
The following Customize dialogs are displayed:
■ The Select Sites dialog
■ The Select VRA Hosts dialog
■ The Select vSphere Logs dialog
■ The Select vCloud Director Logs dialog
The Select Sites dialog is displayed, with the list local site and all the sites paired to it listed.
Those sites that are either protecting or used for recovery for any of the selected VPGs from the previous dialog are
automatically selected.
Note: Zerto Virtual Manager logs from both sites are collected when both sites are trusted sites otherwise only logs from
the local site are collected.
7. Verify that the sites that need analyzing are selected and click Next.
The Select VRA Hosts dialog is displayed.
Those hosts with VRAs that are used to protect or recover any of the selected VPGs are automatically selected.
You can change the collection criteria using the plus and minus buttons. The expected size of the collection package is
updated dependent on the selected VRAs.
8. Verify that the host with VRAs that need analyzing are selected and click Next.
The Select vCenter Server Logs dialog is displayed.
11. Specify destination for the files that you want collected.
Destination: The name and location where the log collection will be saved.
Automatically upload files to Zerto FTP Server: When this option is checked, the log collection is automatically uploaded
to a specified FTP site.
If you choose to upload the log collection to a site that you specify, make sure that the site is up.
12. Specify the FTP site to send the collection and the protocol to use, either FTP or HTTP.
13. Click Next.
The Review dialog is displayed.
Check that you have specified everything you want to collect and if you want to make changes, click Back to change the
selection.
14. Click Start.
The data is collected and stored in the destination file which, by default, is timestamped. If specified, the collection is also
sent to an FTP site.
Note: The log collection is performed on the server. Canceling the collection in the GUI does not stop the collection from
continuing on the server and a new log collection cannot be run until the running collection finishes.
When the log collection has completed the result is displayed. For example:
15. Click Done to return to the Zerto Virtual Replication Diagnostics menu dialog.
16. Send the log to Zerto support, unless the Automatically upload files to Zerto FTP Server option was specified, in which case
it is automatically sent to Zerto.
To collect local Zerto Virtual Manager logs when the Zerto Virtual Manager is not running:
1. Open the Zerto Diagnostics application. For example, via Start > Programs > Zerto > Zerto Virtual Replication
Diagnostics.
The Zerto Virtual ReplicationDiagnostics menu dialog is displayed.
2. Select the Local Zerto Virtual Manager diagnostics option and click Next.
You are prompted to use the first option to collect more comprehensive diagnostics. If you continue, the Initialize dialog is
displayed.
where:
FFFF - A HEX code. For internal use.
yyyy-mm-dd hh:mm:ss - Timestamp for the message.
#### - Number for internal use.
LVL - Severity level of the message. The more messages written to the log the bigger the impact on performance. The number
of messages written to the log decreases from Debug to Error. The level can be one of the following:
Debug: All messages are written to the log. This level should only be specified during testing.
Info: Information messages.
Warn: Warning messages such as a reconnect ion occurred.
Error: Error messages that need handling to find the problem.
Component - The specific part in the Zerto Virtual Manager that issued the message.
API - The specific API that issued the message.
Message - The message written in the log.
The following is a sample from a log:
07f4c878,2010-12-01 19:54:41.4237,Debug,5,
Zerto.Zvm.RemoteZvmConnector.ResyncingRemoteZvmConnector,
TestConnectivity,TestConnectivity returning true,
07f4c878,2010-12-01 19:54:41.7362,Info,11,
Zerto.Zvm.ZvmServices.Protection.PromotionMonitor,
PromotionMonitoringThreadFunc,Promoting protection groups: ,
07f4c878,2010-12-01 19:54:42.7987,Info,9,
Zerto.Infra.ZvmReaderWriterLock,LogLock,Synchronizer: Enter Writer,
07f4c878,2010-12-01 19:54:42.7987,Info,9,
Zerto.Zvm.ZvmServices.ReconnectingConnectorProxy,
GetConnector,"Connecting IP=106.16.223.86, PORT=4005, attempt (1/3)",
07f4c878,2010-12-01 19:54:42.7987,Debug,9,
Zerto.Zvm.VraConnector.VraNetworkConnector,
Connect,try to connect 106.16.223.86:4005 ...,
07f4c878,2010-12-01 19:54:43.0643,Debug,17,
Zerto.Zvm.ZvmServices.CrossSiteService,Ping,Ping,
07f4c878,2010-12-01 19:54:43.0643,Debug,17,
Zerto.Zvm.ZvmServices.PingService,Ping,Ping called,
07f4c878,2010-12-01 19:54:43.8612,Error,9,
Zerto.Zvm.VraConnector.VraNetworkConnector,
ClearAndThrow,connection is closed: No connection could be made because the target
machine actively refused it 106.16.223.86:4005,
07f4c878,2010-12-01 19:54:43.8612,Warn,9,
Zerto.Zvm.ZvmServices.ReconnectingConnectorProxy,GetConnector,failed,
Re-IP Configured As Static Fails During FOL with Reverse Protection 411
CHAPTER 24: ZERTO AND
VMWARE FEATURES
This section describes the interaction between Zerto and commonly used VMware features such as vMotion, DRS and HA.
The following topics are described in this section:
■ “Zerto Permissions in vCenter Server”, below
■ “VMWare Privileges Required by Zerto”, on page 413
■ “Stopping a vCenter Server”, on page 415
■ “Thin-Provisioning”, on page 415
■ “VMware Clusters”, on page 416
■ “Storage Profiles and Storage Clusters”, on page 416
■ “Fault Tolerance”, on page 417
■ “Host Affinity Rules and CPU Pinning”, on page 417
■ “vMotion”, on page 417
■ “Storage vMotion”, on page 417
■ “VMware Host Maintenance Mode”, on page 417
■ “Resiliency to vSphere Environment Changes”, on page 418
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Zerto and VMware Features 412
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Zerto and VMware Features
Thin-Provisioning
VMware vStorage thin-provisioning is a component of vStorage that enables over-allocation of storage capacity for increased
storage utilization, enhanced application uptime and simplified storage capacity management.
When migrating or recovering the virtual machines in a VPG, the virtual machines are migrated or recovered with the same
configuration as the protected machines. Thus, if a virtual machine in a VPG is configured with thin provisioning, then during
migration or recovery the machine is also defined in the recovery site as thin provisioned.
VMware Clusters
A cluster is a group of tightly coupled hosts that work closely together so that in many respects they can be viewed as though
they are a single computer. Clusters are used for high availability and load balancing. With a cluster, you define two or more
physical machines that will provide resources for the hosts that are assigned to that cluster. By using clusters, you can achieve
high availability and load balancing of virtual machines. Load balancing is referred to as DRS (Distributed Resource Scheduler)
by VMware.
Thus, you use clusters for the following:
■ If one of the physical hosts goes down, the other physical host starts up the VMs that the original host was running (high
availability).
■ If one physical host is over utilized by a VM, that VM is moved to the other physical host (DRS).
Both of these features use vMotion to move these virtual guests from one system to another.
You cannot apply high availability nor DRS to a Virtual Replication Appliance (VRA).
Also, see “DRS”, below.
DRS
VMware DRS enables balancing computing workloads with available resources in a cluster.
DRS is automatically disabled by Zerto while updating recovered virtual machines in the recovery site from the journal for these
recovered virtual machines. After the promotion of the data from the journal to the recovered virtual machine completes, DRS
is automatically re-enabled.
If DRS is disabled for the site, VMware removes all resource pools in the site. If the recovery was defined to a resource pool,
recovery will be to any one of the hosts in the recovery site with a VRA installed on it.
Note: If the site is defined in Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have
been defined in Zerto Cloud Manager. For details about Zerto Cloud Manager, refer to Zerto Cloud Manager Administration
Guide.
Fault Tolerance
VMware fault tolerance provides uninterrupted availability by eliminating the need to restart a virtual machine by copying a
functional virtual machine to a second ESX/ESXi host while making sure that both virtual machines are synchronized, so that if
the ESX/ESXi that is hosting the primary virtual machine goes down, the secondary virtual machine takes over.
Zerto does not support fault tolerance for machines in a VPG, nor for a Virtual Replication Appliance (VRA).
vMotion
If you use vMotion to migrate a virtual machine, which is part of a VPG, from one ESX/ESXi host to another ESX/ESXi host,
make sure of the following before moving the virtual machine:
■ The ESX/ESXi host where you are moving the virtual machine to has a Virtual Replication Appliance (VRA) installed on it,
as described in the Zerto Installation Guide.
■ The virtual machine is not a test virtual machine running on the recovery site during the performance of a failover test, as
described in “Testing Recovery”, on page 324.
You cannot move a Virtual Replication Appliance (VRA) from one ESX/ESXi host to another. Also a virtual machine that is
being updated from the VRA journal, after recovery has been initiated, cannot be moved until the promotion of data to the
virtual machine completes.
Storage vMotion
VMware Storage vMotion enables you to perform live migration of virtual machine disk files across heterogeneous storage
arrays with complete transaction integrity and no interruption in service for critical applications enabling you to perform
proactive storage migrations, simplify array refreshes/retirements, improve virtual machine storage performance, and free up
valuable storage capacity in your data center.
Zerto supports Storage vMotion for protected and recovered virtual machine volumes and for journal volumes in the recovery
site, but not for a machine volume in a VPG being promoted.
Note: When a volume is moved using Storage vMotion, the datastore folder under which the volume is saved is the last
datastore folder accessed by VMware.
Zerto enables moving recovery disks managed by a VRA on a host that needs maintaining to be moved to another host for the
duration of the maintenance, as described in “Managing Protection During VMware Host Maintenance”, on page 278.
Note: Automatic detection and powering off the VRA when running host maintenance mode is supported in vCenter version
6.5. For more information see Zerto Virtual Replication Interoperability Matrix.
Configuration and management of disaster recovery for a site are performed in the Zerto User Interface.
The following dialogs and tabs are described in this section:
■ “About Dialog”, on page 420
■ “Add Checkpoint Dialog”, below
■ “Pair Sites - Add Site Dialog”, on page 422
■ “Add Static Route Dialog”, on page 422
■ “Advanced Journal Settings Dialog”, on page 423
■ “Advanced Journal Settings Dialog (vCD)”, on page 424
■ “Advanced VM Recovery Settings Dialog”, on page 426
■ “Advanced VM Replication Settings Dialog”, on page 427
■ “Advanced VM Replication Settings Dialog (vCD)”, on page 427
■ “Advanced VM Settings for Cloud Dialog”, on page 428
■ “ALERTS”, on page 429
■ “Boot Order Dialog”, on page 429
■ “Browse for File Dialog”, on page 431
■ “Change Host Password VRA Dialog”, on page 431
■ “Change VM Recovery VRA Dialog”, on page 432
■ “Checkpoints Dialog”, on page 433
■ “Configure and Install VRA Dialog”, on page 434
■ “Configure Paired Site Routing Dialog”, on page 435
■ “Configure Provider vDCs Dialog”, on page 436
■ “Configure VM Settings Dialog”, on page 437
■ “Edit Volume Dialog (vCD)”, on page 438
■ “Edit NIC Dialog”, on page 444
■ “Edit Repository Dialog”, on page 445
■ “Edit Selected Volumes Dialog”, on page 446
■ “Edit VM Dialog”, on page 446
■ “Edit VM Dialog (vCD)”, on page 447
■ “Edit VM Settings Dialog (AWS)”, on page 450
■ “Edit VM Settings Dialog (Azure)”, on page 451
■ “Edit vNIC Dialog”, on page 452
■ “Edit vNIC Dialog (vCD)”, on page 453
■ “Edit Volumes Dialog”, on page 454
■ “Edit Volumes Dialog (vCD)”, on page 459
■ “Edit VRA Dialog”, on page 465
■ “License Dialog”, on page 466
■ “Manage Static Routes Dialog”, on page 467
■ “New Repository Dialog”, on page 468
■ “Restore - Edit NICs Dialog”, on page 469
■ “Offsite Clone Window”, on page 469
■ “Open Support Case Dialog”, on page 470
■ “Remote Support Dialog”, on page 471
■ “Restore a VPG from Repositories”, on page 472
■ “Restore VPG - Volumes Dialog”, on page 477
■ “Restore VPG - Edit Selected Volumes Dialog”, on page 477
■ “Site Settings Dialog”, on page 478
■ “Stop Failover Test Dialog”, on page 486
■ “TASKS”, on page 486
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
The Zerto Virtual Manager User Interface 419
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
The Zerto Virtual Manager User Interface
About Dialog
In the About window, you can do the following:
■ View the version of Zerto Virtual Replication being run.
■ Enable or disable the Zerto CALLHOME feature. The Zerto CALLHOME feature enables support notification and analytics
for the following purposes:
■ To improve Zerto Virtual Replication.
■ To send notifications to the user when a new Zerto Virtual Replication version is available, or when new hypervisor
versions are supported by Zerto.
■ Enable or disable Zerto Virtual Manager to send data to the SaaS platform for monitoring purposes, using the Zerto Mobile
App. This action is done by licensed Zerto Virtual Manager users.
When clicking About, the following options appear:
Checkpoints are recorded automatically every few seconds in the journal. These checkpoints ensure crash-consistency and are
written to the virtual machine journals by the Zerto Virtual Manager. Each checkpoint has a timestamp set by the Zerto Virtual
Manager. In addition to the automatically generated checkpoints, you can manually add checkpoints to identify events that
might influence the recovery, such as a planned switch over to a secondary generator.
The list of VPGs is displayed. You can select more VPGs to add the same checkpoint.
■ Enter a name for the checkpoint: The name to assign to the checkpoint.
■ Direction: The direction of the protection.
■ VPG Name: The name of the VPG.
■ Protected Site Name: The name of the site where virtual machines are protected.
■ Recovery Site Name: The name of the site where protected virtual machines are recovered.
You can filter columns in the list via the filter icon next to each column title. You can also sort the list by each column. Clicking
the cog on the right side of the table enables you to change the columns that are displayed and to create a permanent view of
the columns you want displayed.
Pair sites
■ Host name/IP: IP address or fully qualified DNS host name of the remote site Zerto Virtual Manager to pair to.
■ Port: The TCP port communication between the sites. Enter the port that was specified during installation. The default port
during the installation is 9081.
■ Address: The network address for the static route that you want to route to.
■ Subnet Mask: The subnet mask for the network.
■ Gateway: The gateway address for the network on the local network of the Zerto Cloud Connector cloud network
interface.
Note: If you change the Zerto Virtual Manager and VRAs cloud network, changing the static route settings for a group to the
new network only changes the access for new Zerto Cloud Connectors with the specified group. Existing Zerto Cloud
Connectors must be redeployed to use the changed static route.
Displays the recovery settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED.
Displays the replication settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED.
Displays the recovery settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED.
ALERTS
Monitor the recent alerts by clicking the ALERTS area in the status bar at the bottom of the Zerto User Interface. The following
information is displayed for the most recent alerts:
■ The alert status.
■ The site where the alert is issued.
■ A description of the alert.
Click All Alerts to access MONITORING > ALERTS.
To specify the boot order of virtual machines in a VPG. When machines are started up on recovery, for example, after a move
operation, the virtual machines in the VPG are not started up in a particular order. If you want specific virtual machines to start
before other machines, you can specify a boot order. The virtual machines are defined in groups and the boot order applies to
the groups and not to individual virtual machines in the groups. You can specify a delay between groups during startup.
Initially, virtual machines in the VPG are displayed together under the default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
There is no boot order for virtual machines within a group, only between groups.
■ ADD GROUP: Adds a group. After adding a group you can edit the group name by clicking the Edit icon at the right of the
group name and remove the group via the delete icon at the right of the group. You cannot remove the Default group nor a
group that contains a virtual machine.
■ Boot Delay: Specifies a time delay between starting up the virtual machines in the group and starting up the virtual
machines in the next group. For example, assume three groups, Default, Server, and Client defined in this order. The Start-
up delay defined for the Default group is 10, for the Server group is 100 and for the Client group 0. The virtual machines in
ALERTS 429
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
The Zerto Virtual Manager User Interface
the Default group are started together and after 10 seconds the virtual machines in the Server group are started. After 100
seconds the virtual machines in the Client group are started up.
To select the folder with the preseeded disk to use. Drill-down to select the disk.
Disks that are not viable for preseeding are grayed out.
To change the connectivity, VIB or password, used by the VRA to connect to the host. If using a password to connect to the
host, to change the password used by the VRA.
■ If the VRA is using a password to connect to the host and using VIB is required, check Use credentials to connect to host.
■ If the VRA is using VIB to connect to the host and using a password is required, uncheck Use credentials to connect to
host and enter the password. If the VRA is connecting to the host with a password and the password for the host has
changed, enter the new password.
To change the recovery host required by the VRA to access the host.
■ VM Name: The name of the virtual machine.
■ VPG Name: The name of the VPG.
■ ZORG: The Zerto name given to the organization, the ZORG, by a cloud service provider. For details, refer to Zerto Cloud
Manager Administration Guide.
■ VM Size GB: The virtual machine size in gigabytes.
■ # of Volumes: The number of volumes used by the virtual machine.
■ VM Hardware Version: The hardware version of the virtual machine.
■ Target Host: The host in which to move the recovery virtual machines.
■ Select the replacement host: The name of the host to move the recovery virtual machines.
Auto Select the replacement host: Selects the most suitable host to move the recovery virtual machines to.
Checkpoints Dialog
becomes full, a Bitmap Sync is performed after space is freed up in the buffer. For details, refer to Zerto Scale and
Benchmarking Guidelines.
■ VRA Bandwidth Group: Choose the VRA Bandwidth Group from the dropdown list. To create a new VRA group, type
in the name of the new group and click CREATE. You can then choose the new group from the dropdown list.
You group VRAs together when VRAs use different networks so they can be grouped by network, for example when
the protected and recovery sites are managed by the same vCenter Server and you want to replicate from the branch
site to the main site. Within a group the priority assigned to a VPG dictates the bandwidth used and is applicable
within a group and not between groups. Thus, a VPG with a high priority is allocated bandwidth before VPGs with
lower priorities. VPGs that are on VRAs with different VRA groups, for example, VPG1 on VRA1 in group1 and VPG2 on
VRA2 in group2, do not affect each other, as the priority is relevant only within each group.
3. Specify the following VRA Network Details:
■ Configuration: Either have the IP address allocated via a static IP address or a DHCP server. If you select the Static
option, which is the recommended option, enter the following:
■ Address: The IP address for the VRA.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default gateway for the network.
4. Click INSTALL.
The VRA installation starts and the status is displayed in the TASKS popup dialog in the status bar and under
MONITORING > TASKS.
The VRA displayed name, and DNS name, is Z-VRA-hostname. If a virtual machine with this name exists, for example
when a previous VRA was not deleted, the VRA name has a number appended to it.
5.
The IP address, subnet mask, and gateway to access the peer site VRAs when access to the peer site VRAs is not via the
default gateway.
■ Enable Paired Site Routing: When checked, enables paired site routing.
■ Address: The IP address of the next hop at the local site, the router, or gateway address that is used to access the peer site
network.
■ Subnet Mask: The subnet mask for the peer site network.
■ Gateway: The gateway for the peer site network.
These access details are used to access the VRAs on the peer site.
The settings in the Configure Paired Site Routing dialog apply to all VRAs installed after the information is saved. Any existing
VRA is not affected and access to these VRAs continues via the default gateway. If the default gateway stops being used, you
must reinstall the VRAs that were installed before setting up paired site routing.
Accessed from Site Settings > Cloud Settings tab > Datastore Configuration area.
Used by Zerto Cloud Service Providers to define provider vDCs, and to define which datastores can be used by Zerto, to which
purpose.
Datastores which are not listed in this window may be used by Zerto, unless they are explicitly excluded.
Note:
Before setting up Zerto Virtual Replication to work with vCD, you must have an AMQP server installed.
■ Zerto provides an AMQP installation kit if you do not have one installed for vCD, available as a download from the
Zerto Support Portal, from the downloads page.
■ Run ZertoAMQPInstallWizard.exe from the kit and when prompted enter the IP or host name of the vCD and the
administrator user and password to access this vCD.
■ The Zerto Virtual Manager connects to the vCD and checks whether an AMQP server is installed.
■ If an AMQP server is not installed, Zerto recommends using RabbitMQ, which in turn requires Erlang/OTP.
■ Links to the sites to install both Erlang/OTP and RabbitMQ are provided as part of the Zerto AMQP installation.
Use these links to install Erlang/OTP and then RabbitMQ, then you can continue with the Zerto AMQP
installation.
■ If an AMQP server was already installed, change the connection details displayed to those defined in vCD.
■ If you installed the AMQP server as part of the Zerto AMQP installation, the default settings for these installations
are displayed, with a user and password of guest.
■ At the end of the Zerto AMQP installation, vCD is updated with these settings, in AMQP Broker Settings under
Administration > Blocking Tasks > Settings.
■ Unlisted datastores are not used by Zerto Virtual Replication: Clearly define that datastores which are not listed in
this window cannot be used.
■ Unlisted datastores can be used for all purposes: Allow unlisted datastores of all provider vDCs, even those provider
vDCs that were not added to the list of Provider vDCs can be used for any purpose.
8. In the Provider Datastore area, click Add, to add datastores.
■ Select the Recovery Volume checkbox, if the datastore can be used as a recovery datastore.
■ Select the Journal checkbox if the datastore can be used for the journal.
■ Select the Preseed checkbox if the datastore can be used for preseeded disks. Only datastores marked as preseeded
can be used, preventing different organizations being exposed to datastores of other customers using the preseed
option.
■ In order to exclude a datastore, add it to the list, then deselect all checkboxes.
1.
Specifies the values to use when restoring the selected virtual machines.
■ Restore on Host: The IP address of the host where you want the virtual machine restored.
■ Restore on Datastore / Storage: The datastore/storage to use for the restored virtual machine files.
■ Power On: Select this if you want the restored virtual machine to be powered on.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto Virtual Replication supports the SCSI protocol. Only disks that
support this protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto Virtual Replication takes ownership of the
preseeded disk, moving it from its source folder to the folder used by
the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto Virtual Replication makes sure that the
VMDK disk size is a correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
Specify the NIC settings when restoring a retention set to the recovery site.
■ NIC Name: The name of the selected NIC.
■ Network: The network to use for the restored virtual machine.
■ Create new MAC address: The Media Access Control address (MAC address) to use. The default is to use the same MAC
address for the restored virtual machine that was used in the protected site. Check the box to create a new MAC address
on the restore site.
■ Change vNIC IP Configuration: Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is
changed after the restore has completed when VMware Tools are installed.
■ If Static is selected, the IP address, subnet mask, and default gateway must be set.
■ If DHCP is selected, the IP configuration and DNS server configurations are assigned automatically, to match the
protected virtual machine.
■ IP Address: The IP for the restored virtual machine. This can be the same IP as the original protected virtual machine.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default mask for the network.
■ Preferred DNS Server: The IP address of the primary DNS server to handle Internet protocol mapping.
■ Alternate DNS Server: The IP address of the alternate DNS server.
■ DNS Suffix: The DNS name excluding the host.
To edit a Repository:
1. In the Zerto User Interface, click SETUP tab, REPOSITORIES sub-tab.
2. Select the Repository to edit and click MORE > Edit.
The Edit Repository window is displayed.
Edit VM Dialog
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore. If Unlimited is
chosen, the fields Size and Percentage are not relevant.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the value of Size and Percentage must be less than the configured hard limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
■ Journal Datastore: The datastore used for the journal data for each virtual machine in the VPG. To change the default,
specify a host and then select one of the datastores accessible by this host to be used as the journal datastore. When you
select specific journal datastore, the journals for each virtual machine in the VPG are stored in this datastore, regardless of
where the recovery datastores are for each virtual machine. In this case, all the protected virtual machines must be
recovered to hosts that can access the specified journal datastore.
■ For Edit VM in vCD, see “Edit VM Dialog (vCD)”, on page 447.
■ For Edit VM Setting in AWS, see “Edit VM Settings Dialog (AWS)”, on page 450.
■ For Edit VM Settings in Azure, see “Edit VM Settings Dialog (Azure)”, on page 451.
■ Storage Policy: The Storage Policy in which the VM configuration files will reside. See considerations below.
■ Journal Storage Policy: The Storage Policy in which the VM Journal files will reside. See considerations below.
4. When selecting a Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place these files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ Zerto will try to determine a default Storage Policy according to:
■ A Storage Policy with the same name as the protected Storage Policy.
■ The default Orgvdc Storage Policy.
If Zerto did not manage to determine a default Storage Policy, this field appears empty.
■ When you click to edit, a list of Storage Policies appear. These Storage Policies:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Recovery Volume in the Configure Provider vDCs Dialog.
5. When selecting a Journal Storage Policy, consider the following:
■ Zerto will select a datastore from the selected Storage Policy in which to place the Journal files, unless the datastore is
excluded in the Configure Provider vDCs Dialog.
■ The default Journal Storage Policy is the same as the default VM Storage Policy.
■ If Zerto did not manage to determine a default Journal Storage Policy, this field appears empty.
■ When you click to edit, the option Auto Select appears, and a list of Storage Policies.
■ The list of Storage Policies associated with the Journal:
■ Were defined in VMware vCloud Director and are configured in the Orgvdc.
■ Have at least one Datastore that was not excluded as a Journal in the Configure Provider vDCs Dialog.
■ Auto Select: Selecting this means that the journal can be placed in any datastore visible to the host that Zerto selected
for recovery, unless the datastore is excluded in the Configure Provider vDCs Dialog.
6. Define the remaining fields as follows:
Edit the network settings for one or more virtual machines in a VPG that will be recovered to AWS. There are recovery settings
for failovers and moves, and for failover tests.
Import Method
■ AWS Import: The method that has been used in all past implementations.
■ Zerto Import for all volumes: This is the fastest import method and uses a zImport VM for all volumes. A zImport virtual
machine is created, per volume. For each recovered volume, the zImport virtual machine is terminated when all the data
has been imported and its disk has been attached to the recovered virtual machine.
■ Zerto Import for data volumes: Uses the zImport method for data volumes only. This is the default setting and has a faster
RTO than AWS Import.
VPC Network: A virtual network dedicated to your AWS account.
Subnet: A range of IP addresses in your VPC.
Security Group: The AWS security to be associated with the virtual machines in this VPG. You can associate one or more
security groups with the virtual machines.
Instance Family: The instance family from which to select the type. AWS instance families are optimized for different types of
applications. Choose the instance family appropriate for the application in the virtual machine protected in the VPG.
Instance Type: The instance type, within the instance family, to assign to recovered instances. Different types within an
instance family vary primarily in vCPU, ECU, RAM, and local storage size. The price per instance is directly related to the
instance size.
Private IP: The private IP of an instance from the selected subnet. If you do not set the private IP, during recovery, AWS sets the
private IP from the defined subnet range.
Edit the network settings for one or more virtual machines in a VPG that will be recovered to Azure. There are recovery settings
for failovers and moves, and for failover tests.
■ VNet: A The virtual network dedicated to your Azure subscription.
■ Subnet: A range of IP addresses in your VPC.
■ Network Security Group: The Azure network security to be associated with the virtual machines in this VPG. You can
associate one or more network security groups with the virtual machines.
■ Recovery Disk Type: The Azure recovery storage type to which the entire VPG will be recovered to; Premium Managed or
Standard Storage. The Virtual Machine Series and Virtual Machine Size fields are updated with the relevant options based
on the selected Recovery Disk Type.
■ Virtual Machine Series: The virtual machine series from which to select the size. Azure virtual machine series are
optimized for different types of applications. The default is set to DSv2. You can choose the virtual machine series
appropriate for the application being protected in the VPG.
■ Virtual Machine Size: The virtual machine size, within the virtual machine series, to assign to recovered virtual machines.
Different sizes within a virtual machine series vary, for example in a number of cores, RAM, and local storage size. The
default is set to Standard_DS1_v2. You can choose the virtual machine size appropriate for the application being protected
in the VPG. The price per virtual machine is related to the virtual machine configuration.
■ Private IP: The private IP of an instance from the selected subnet. If you do not set the private IP, during recovery, Azure
sets the private IP from the defined subnet range.
Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
7. In each column, specify the following:
■ Network: The network to use for this virtual machine.
■ Create new MAC address?: Whether the Media Access Control address (MAC address) used on the protected site
should be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you
check this option, to create a new MAC address, and the current IP address is not specified, the protected virtual
machine static IP address might not be used for the recovered virtual machine.
■ Change vNIC IP Configuration?: Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is
only changed after recovery for virtual machines with VMware Tools running.
See the Zerto Virtual Replication Interoperability Matrix for the list of operating systems for which Zerto supports Re-
IPing.
■ To change the vNIC IP, in the Failover/Move or Test column, select Yes. If you select to use a static IP connection,
set the IP address, subnet mask, and default gateway.
■ Optionally, change the preferred and alternate DNS server IPs and the DNS suffix.
■ If you leave the DNS server and suffix entries empty, or select to use DHCP, the IP configuration and DNS server
configurations are assigned automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each
octet in the Default gateway field for the NICs with no default gateway.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
then after the virtual machine has started, it is automatically rebooted so that it starts up with the correct IP. If the
same network is used for both production and test failovers, Zerto recommends changing the IP address for the virtual
machines started for the test, so that there is no IP clash between the test machines and the production machines.
■ Copy to failover test: Select this to copy the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Select this to copy the settings in the Test column to the Failover/Move column.
NOTE:
■ Copy to failover test: Copies the settings in the Failover/Move column to the Test column.
■ Copy to failover/move: Copies the settings in the Test column to the Failover/Move column.
■ For Hyper-V recovery environments, the following window appears. For details, click here.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto Virtual Replication supports the SCSI protocol. Only disks that
support this protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto Virtual Replication takes ownership of the
preseeded disk, moving it from its source folder to the folder used by
the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto Virtual Replication makes sure that the
VMDK disk size is a correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
■ For Hyper-V recovery environments, the following window appears. For details, click here.
■ For vSphere recovery environments, the following window appears. For details, click here.
■ For vCD recovery environments, the following window appears. For details, click here.
■ Specify the Datastore to use to create disks for the replicated data.
■ If the source disk is thin provisioned, the default for the recovery
volume is also thin provisioned.
■ The datastore specified for replication must have at least the same
amount of space as the protected volume and an additional amount
for the journal.
■ The amount of additional space needed for the journal can be fixed
by specifying a maximum size for the journal, or can be calculated as
the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
■ Zerto Virtual Replication supports the SCSI protocol. Only disks that
support this protocol can be specified.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
For more details, see Zerto Scale and Benchmarking Guidelines, in the
section Estimating WAN Bandwidth for VMware and Hyper-V.
Volume Source > RDM: The VMware RDM (Raw Device Mapping)
which will be used for the replication.
Consider the following, then proceed to define the Datastore and the
Path:
■ Zerto recommends using this option particularly for large disks so
that the initial synchronization is faster since a Delta Sync can be
used to synchronize any changes written to the recovery site after
the creation of the preseeded disk.
■ If a preseeded disk is not selected, the initial synchronization phase
must copy the whole disk over the WAN.
■ If you use a preseeded virtual disk, you select the datastore and
exact location, folder, and name of the preseeded disk, which cannot
be an IDE disk. Zerto Virtual Replication takes ownership of the
preseeded disk, moving it from its source folder to the folder used by
the VRA.
■ The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
■ If the preseeded disk is greater than 1TB on NFS storage, the VPG
creation might fail. This is a known VMware problem when the NFS
client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client
times out. The timeout default value is 10 seconds. See VMware
documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919,
which describes the configuration option to tune the RPC timeout
parameter by using the command: esxcfg-advcfg -s <Timeout>
/NFS/SetAttrRPCTimeout
■ If the protected disks are non-default geometry, configure the VPG
using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a
recovery VMDK disk. Zerto Virtual Replication makes sure that the
VMDK disk size is a correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the
location of the preseeded disk must be defined in the Zerto Cloud
Manager. See Zerto Cloud Manager Administration Guide.
Then, define the following:
■ Datastore: The Datastore where the preseeded disk is located. Only
disks with the same size as the protected disk can be selected when
browsing for a preseeded disk.
■ Path: The full path to the preseeded disk.
To review site-specific Storage Policy configurations, see Configure Provider vDCs Dialog.
To change the network settings for a VRA, for example when the gateway to the VRA is changed.
■ Host: The IP of the host on which the VRA is installed.
For ESXi 5.5 and later hosts, by default, Zerto Virtual Manager uses a vSphere Installation Bundle, VIB, to connect to the
host. When using VIB:
■ The user does not enter a password.
■ Once a day, Zerto Virtual Manager checks that the VRA and host can connect. If the connection fails, Zerto Virtual
Manager re-initiates the connection automatically and notes this in the log.
When using a password, root access is required if the Zerto host component is down and needs an automatic restart. Once
a day, Zerto Virtual Manager checks that the password is valid. If the password was changed, an alert is triggered,
requesting the user enter the new password.
■ (vSphere only) Use credentials to connect to host: When unchecked, the Zerto Virtual Manager uses VIB to connect to
the host. This field is only relevant for ESXi 5.5 and later.
■ (vSphere only) Host Root Password: When the VRA should connect to the host with a password, select Use credential to
connect to host, then enter the root user password used to access the host. When the box on the right side is selected, the
password is displayed in plain text.This field is only relevant for ESXi 4.x and 5.x hosts. This field is disabled for ESX 4.x
hosts.
■ VRA Bandwidth Group: The free text to identify the group to which a VRA belongs. If you create a group and then change
the name when editing the VRA so that there is no VRA in the site that belongs to the originally specified group, the group
is automatically deleted from the system.
To create a new group, enter the new group name over the text New group and click CREATE.
■ Configuration: Either have the IP address allocated via a static IP address or a DHCP server. If the VRA was originally
installed with a static IP, you cannot change this to DHCP. If the VRA was originally installed to use a DHCP server, you can
change this to use a static IP.
■ Address: The static IP address for the VRA to communicate with the Zerto Virtual Manager.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default gateway for the network.
License Dialog
The Zerto license includes information such as the number of virtual machines that can be protected and the license expiry
date. You can see these details by clicking in the top right of the header and selecting License.
When providing DR as a Service, the cloud service provider needs to ensure complete separation between the organization
network and the cloud service provider network. The cloud service provider needs to be able to route traffic between an
organization network and the cloud replication network, in a secure manner without going through complex network and
routing setups.
The cloud service provider can define a Zerto Cloud Connector per organization site, that has two Ethernet interfaces, one to
the organization’s network and one to the cloud service provider's network. If the cloud service provider wants to add
additional security, considering both cloud connector interfaces as part of the organization network, the cloud service provider
can define a static route that will hop to a different cloud network, specifically for use by the Zerto Virtual Manager and VRAs
in the cloud site.
■ ADD: Click this field to add an entity and to define the static route it will use. Once you click ADD, the dialog changes:
■ NEW GROUP: Defines a group that will use a static route to the subnet used by the Zerto Virtual Manager. Enter the name
of the organization that will use this static route.
■ Add Static Route: Opens the Add Static Route Dialog.
Define Repositories on the recovery site where retention sets can be stored. The Repositories are connected over the network,
leveraging SMB(CIFS) or NFS protocols, on top of a simple network share or PBBA.
The Repository is defined as part of the retention policy configuration.
When restoring a retention set to the recovery site, this dialog shows the NIC settings for the virtual machines in the VPG. You
can choose to edit information in one field by clicking the field and updating the information. You can choose to edit the NIC
settings for several virtual machines at the same time by selecting the NICs and clicking EDIT SELECTED.
For more details, see “Restore VPG - Volumes Dialog”, on page 477.
To create a clone of each virtual machine in a VPG on the recovery site in the production network. The clone is a copy of the
protected virtual machines on the recovery site, while the virtual machines on the protected site remain protected and live.
■ SELECT A CHECKPOINT: Opens the Checkpoints Dialog to select the checkpoint to use to make the clone.
The Using checkpoint field is updated with your selection.
■ (On-Premise) Recovery Datastore: Select the datastore to use for the recovery virtual machines.
■ Advanced: Select specific VMs to clone.
For more details, see Checkpoints Dialog.
1. In the Zerto User Interface, click in the top right of the header and select Open a Case.
The Open Support Case window for the site opens.
Remote Log Collection allows customers to authorize Zerto support engineers to collect logs from their environment. By using
remote log collection customers can avoid having to use the Diagnostic Tool on their ZVM server in order to collect logs for
analysis, a potentially complex and time-consuming procedure.
■ Never: Remote log collection is not allowed (default). If remote log collection is currently allowed, the remote connection
will be terminated if you select this option.
■ For the next 30 days: Remote log collection is allowed. This permission will automatically terminate in 30 days unless
terminated by selecting the Never option.
■ Only for the duration of a specific case: You will be prompted to select the Case number from the drop-down list. The list
contains all the active cases opened under the account that the Zerto Virtual Manager is registered to. Remote log
collection will be allowed for as long as the case is active or until remote log collection is terminated by selecting the Never
option.
To restore a VPG:
1. In the Zerto User Interface select ACTIONS > RESTORE.
The Restore wizard is displayed.
4. From the list of available retention sets, select the retention set to restore, where:
■ Point in Time: The date and time the retention set was performed.
■ Restore Site: The recovery site for the VPG.
■ VMs: The number of virtual machines with retention, out of the total number of virtual machines.
■ Volumes: The number of volumes with retention, out of the total number of volumes for the virtual machines.
■ Repository: The name of the repository where the retention set is stored.
■ ZORG: (ZCM sites only) The Zerto organization for which the retention set was created. This field only has a
value if the Zerto Cloud Manager is connected to the site. For details, see Zerto Cloud Manager
Administration Guide.
5. When you select a retention set to restore, the list of virtual machines in the retention set appear, displaying the following
information:
VM Name: The name of the virtual machine.
# Volumes Retained: The number of volumes retained, out of the total number of volumes for the virtual machine.
6. If the restore site has the option to restore to vCD, select where to attach the restored VMs, either to VC or vCD.
7. Click NEXT.
The VM SETTINGS step is displayed.
The list of virtual machines that can be restored is displayed.
8. You can specify the following which are then applied to all the virtual machines to be restored:
■ Restore on Host: The IP address of the host where you want the VPG restored.
After selecting a host, the Restore on Datastore field is displayed.
■ Restore on Datastore: The datastore to use for the restored VPG files.
- Or -
■ Alternatively, you can use the recovery host and storage specified for each virtual machine in the VPG definition by
clicking APPLY VPG CONFIGURATION. To use this option, the VPG must still be available.
9. To change the information in a field, click the field and update the information.
10. To change the host or datastore information for several virtual machines at the same time, select the virtual machines and
click EDIT SELECTED.
The Configure VM Settings window is displayed.
If one or more of the volumes which was retained, was deleted after the retention set was created, or if one of the volumes
failed, the entire retention process for that VM will fail.
You can specify the following values, which are then applied to all the selected virtual machines:
■ Restore on Host: The IP address of the host where you want the virtual machines restored.
■ Restore on Datastore: The datastore to use for the restored virtual machine files.
■ Power On: Select this if you want the restored virtual machines to be powered on.
- Or -
Alternatively, you can use the recovery host and storage specified for each virtual machine in the VPG definition by clicking
APPLY VPG CONFIGURATION.
11. To specify the volume information for each virtual machine, from the Actions column, click Volumes.
The Volumes dialog is displayed:
12. To edit information in a field, click the field and update the information.
13. To edit information for several datastores at the same time, select the datastores and click EDIT SELECTED.
The Edit Selected Volumes dialog is displayed.
17. To edit information in one field, click the field and update the information.
18. To edit information for several virtual NICs at the same time, select the NICs and click EDIT SELECTED.
The Edit NIC dialog is displayed.
■ Change vNIC IP Whether or not to keep the default virtual NIC (vNIC) IP configuration.
Configuration:
You can only change the vNIC IP after the restore has completed with VMware Tools
installed.
■ If you select a static IP connection, you must set the IP address, subnet mask, and
default gateway. Optionally, change the preferred and alternate DNS server IPs and
the DNS suffix.
■ If you select DHCP, the IP configuration and DNS server configurations are assigned
automatically, to match the protected virtual machine. You can change the DNS
suffix.
■ IP Address: The IP for the restored virtual machine. This can be the same IP as the original protected
virtual machine.
■ Subnet Mask: The subnet mask for the network. The default value is 255.255.255.0.
■ Default Gateway: The default mask for the network.
■ Preferred DNS Server: The IP address of the primary DNS server to handle Internet protocol mapping.
■ Alternate DNS Server: The IP address of the alternate DNS server.
■ DNS Suffix: The DNS name excluding the host.
20. Click OK.
21. Click DONE.
22. Click NEXT.
The SUMMARY step is displayed. Review the details of the restore.
23. If this is the retention set which you want to restore, click RESTORE.
The virtual machines are created from the Repository at the recovery site.
When restoring a retention set to the recovery site, this window shows the datastores for a selected virtual machine in the
VPG.
■ You can edit information in one field by clicking the field and updating the information.
■ You can edit several datastore settings at the same time by selecting the datastores and clicking EDIT SELECTED.
1. In the Zerto User Interface (top right), click SETTING ( ) and select Site Settings.
The Site Settings dialog is displayed.
■ In vSphere and Hyper-V sites, the following fields are displayed:
■ Bandwidth Throttling:
Define this to control the amount of traffic going out of your site. When defined, this is the maximum bandwidth that Zerto
Virtual Replication uses from this site to all peer recovery sites.
If you do not specify bandwidth throttling, the default is for Zerto Virtual Replication to automatically assign the bandwidth
used per VPG, based on using the maximum available and then prioritizing the usage according to the priority set for the
VPGs sending data over the WAN.
Note: For minimum bandwidth requirements, see Zerto Scale and Benchmarking Guidelines.
■ By default, Limited is selected.
■ In the text box, set the MB/sec. The valid range is from 0 to 1300 MB/sec.
■ With 0 MB/sec, Zerto Virtual Replication automatically assigns the bandwidth used per VPG, based on using the
maximum available and then prioritizing the usage according to the priority set for the VPGs sending data over the
WAN.
■ Enter the MB/sec when the value required is 100 MB/sec or more.
■ Time-based Throttling:
Define this to throttle the bandwidth during specific times. For example, during the daily peak transaction period you can
change the bandwidth throttling, to override the general setting.
IMPORTANT:
■ Enable Bandwidth Regulation: Use this for troubleshooting - to enable regulating the bandwidth.
■ Enable IO throttling: If a host is handling too many IOs, then the IOs begin to get high latencies. To offset this the VRA
sends fewer concurrent IOs. The latency is measured by taking the average latency for all IOs over a set period of time. For
example, when the period is 5000 milliseconds and the bad IO latency is 40, the average latency is calculated every 5
seconds, and if the average latency exceeds 40, the VRA sends fewer concurrent IOs.
■ Bad IO Latency VM: The threshold above which the latency is considered high, and therefore bad.
■ Requested Duration (ms): The period of time used to measure the average latency.
Policies Dialog
■ Failover/Move Commit Policy: The commit policy to use during a failover or move operation. The value set here is the
default for all failover or move operations from this point on but can be changed when defining a failover or move
operation. The following options are available:
■ None: The failover or move operation must be manually committed or rolled back by the user.
■ Commit: After the time specified in the Default Timeout field, the failover or move operation is committed. During the
specified time you can check the recovered VPG virtual machines, and you can manually commit or roll back.
■ Rollback: After the time specified in the Default Timeout field the failover or move operation is rolled back, unless you
manually commit it or roll it back before the time out value is reached. During the specified time you can check the
recovered VPG virtual machines.
■ Default Timeout: The time-out in minutes after which a Commit or Rollback is performed. A value of zero indicates that
the system automatically performs the commit policy, without waiting for any user interaction.
■ Default Script Execution Timeout: The length of time in seconds after which a script times out.
■ Enable Replication to Self: Enable the same site to be used as both the protected and recovery site.
■ Replication Pause Time: The time to pause when synchronizing a VPG if continuing the synchronization will cause all the
checkpoints in the journal to be removed.
■ For incoming replication, copy the BIOS UUID of the protected VM to the recovered VM: Select this to preserve the BIOS
UUID of the protected VM after recovery operations, in the recovery ZVM Site Settings window.
Note:
■ Preserving of the BIOS UUID is not supported in Clone and Self-Replication recovery operations.
■ Preserving of the BIOS UUID is not supported in Public Cloud.
■ Cross replication is not supported.
■ Allow Zerto to always enter hosts to maintenance mode during remediation:
■ When this is selected, if the Virtual Update Manager's Remediation task is detected, Zerto will automatically enter the
host into maintenance mode.
■ The host will exit maintenance mode when the Virtual Update Manager's Remediation task is completed.
■ The VRA is powered on automatically when the host exits maintenance mode.
Note: Automatic detection and powering off the VRA when running host maintenance mode is supported in vCenter
version 6.5. For more information see Zerto Virtual Replication Interoperability Matrix.
■ In some upgrade environments, Virtual Update Manager requires the host to enter maintenance mode. For further details,
see “Support for VMware Virtual Update Manager (VUM)”, on page 279.
Notes:
■ Recovery and journal volumes that reside on the host are not automatically migrated to another host in the cluster.
Reports Dialog
Compatibility Dialog
■ Select Use vCD to enter the VMware vCloud Director access details:
■ IP Address: The IP address or host name of the machine where vCD runs. When connecting to vCD with multiple cells,
enter the virtual IP for the network load balancing used by the cells.
■ Username: The user name for an administrator to vCD.
■ Password: A valid password for the given user name.
■ AMQP Username: The user name for the AMQP server.
■ AMQP Password: A valid password for the given AMQP user name.
■ Manage Static Routes: Click Configure to define static route details. Go to Manage Static Routes Dialog.
■ Provider vDC Settings: Click Configure to define provider vDC settings and their datastore configuration. Go to Configure
Provider vDCs Dialog.
Indexing Repository: The Repository where all the VMs’ File System Indexing meta-data is stored.
For further details, see “Using Zerto’s Long Term Retention”, on page 365.
TASKS
Monitor the recent tasks by clicking the TASKS area in the status bar at the bottom of the Zerto User Interface. The following
information is displayed for the most recent tasks:
■ The task status.
■ The name of the task.
TASKS 487
CHAPTER 26: GLOSSARY
Access Key (AWS) An alphanumeric text string that uniquely identifies the AWS account owner. No two accounts can
have the same AWS Access Key.
Amazon Web Services A collection of remote computing services, also called web services, that make up a cloud computing
(AWS) platform by Amazon.com. The most central and well-known of these services are Amazon EC2 and
Amazon S3. The service is advertised as providing a large computing capacity (potentially many
servers) much faster and cheaper than building a physical server farm.
Asynch Replication See Replication, Asynchronous.
Backup See Long Term Retention.
Bare Metal A computer system or network in which a virtual machine is installed directly on hardware rather than
within the host operating system (OS).
Bitmap Sync1 A change tracking mechanism of the protected machines during a disconnected state when Zerto
Virtual Replication starts to maintain a smart bitmap in memory to track and record changed storage
areas. Since the bitmap is kept in memory, Zerto Virtual Replication does not require any LUN or
volume per VPG at the source side.
The bitmap is small and scales dynamically, containing references to the areas of the source disk that
have changed but not the actual I/O. The bitmap is stored locally on the VRA within the available
resources. For example, when a VRA goes down and is then rebooted.
When required, Zerto Virtual Replication starts to maintain a smart bitmap in memory, to track and
record storage areas that change. When the issue that caused the bitmap sync is resolved, the bitmap
is used to check updates to the source disks and send any updates to the recovery site. A bitmap sync
occurs during the following conditions:
■ Synchronization after WAN failure or when the load over the WAN is too great for the WAN to
handle, in which case the VPGs with the lower priorities will be the first to enter a Bitmap Sync.
■ When there is storage congestion at the recovery site, for example when the VRA at the recovery
site cannot handle all the writes received from the protected site in a timely fashion.
■ When the VRA at the recovery site goes down and is then rebooted.
During the synchronization, new checkpoints are not added to the journal but recovery operations are
still possible. If a disaster occurs requiring a failover during a bitmap synchronization, you can recover
to the last checkpoint written to the journal.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Bucket (AWS) Amazon buckets are like a container for your files. You can name your buckets the way you like but it
should be unique across the Amazon system.
Business Continuity & An organization’s ability to recover from a disaster and/or unexpected event and resume or continue
Disaster Recovery operations. A disaster recovery, DR, plan is a subset of a Business Continuity plan. Organizations
(BC/DR) should have a business continuity, BC, plan in place that outlines the logistics and business operations.
The key metrics to be measured in a disaster recovery environment are the Recovery Point Objective
(RPO) and Recovery Time Objective (RTO).
Business Continuity Holistic management process that identifies potential threats to an organization and the impacts to
Management (BCM) business operations that those threats, if realized, might cause, and which provides a framework for
building organizational resilience with the capability for an effective response that safeguards the
interests of its key stakeholders, reputation, brand and value-creating activities. (ISO 22313, formerly
BS 25999-1).
Zerto Virtual Manager Administration Guide for VMware vSphere Environments - Version 7.0
Glossary 488
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
Business Continuity Contains the instructions, procedures and guidelines that are developed and maintained in readiness
Plan for use during and after any potentially disruptive event in order to enable the organization to continue
to deliver its critical activities at an acceptable, predefined level.
Business Impact The process of analyzing business functions and processes and the effects that a business disruption
Analysis (BIA) might have upon them.
Checkpoint Zerto Virtual Replication ensures crash consistency by writing checkpoints to the journal every few
seconds. These checkpoints ensure write order fidelity and crash-consistency to each checkpoint.
During recovery you pick one of these crash-consistent checkpoints and recover to this point.
Additionally, checkpoints can be manually added by the administrator, with a description of the
checkpoint. For example, when an event is going to take place that might result in the need to perform
a recovery, you can pinpoint when this event occurs as a checkpoint in each journal.
Cloud Service Provider A service provider that offers customers storage or software services available via a private (private
(CSP) cloud) or public network (cloud). Usually, it means the storage and software is available for access via
the Internet. Typically Infrastructure as a Service (IaaS), Software as a Service (SaaS), or Platform as a
Service (PaaS) – are offered to their customers. Zerto enables them to offer Disaster Recovery As A
Service (DRaaS) and In-Cloud DR (ICDR), too.
Crisis Management Provides the overall coordination of the organization’s response to a crisis (which is a critical event
Plan that needs to be handled appropriately to prevent a damaging impact to the organization’s
profitability, reputation or ability to operate).
Delta Sync1 The Delta Sync uses a checksum comparison to minimize the use of network resources. A Delta Sync
is used when the protected virtual machine disks and the recovery disks should already be
synchronized, except for a possible few changes to the protected disks, for example, when the target
recovery disk is defined as a preseeded (not available in the cloud) disk or after a VRA upgrade, or for
reverse protection after a move or failover.
During the synchronization, new checkpoints are not added to the journal but recovery operations are
still possible. If a disaster occurs requiring a failover during a delta synchronization, you can recover to
the last checkpoint written to the journal.
It is not possible to perform a move during a delta sync.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Disaster The occurrence of one or more events which, either separately or cumulatively, activate disaster
recovery.
Disaster Recovery The ability to restart operations after an interruption to the business according to a plan that ensures
an orderly and timely restoration.
Disaster Recovery Plan The disaster recovery, DR, plan is a component of the Business Continuity plan that details the
process and procedures to recover the organization’s resources to continue business operations. The
Technology DR plan focuses on the IT disaster recovery. Also see Business Continuity Plan.
Disaster Recovery As A disaster recovery solution that incorporates a service provider to replace or augment the
A Service (DRaaS) organization’s data protection implementation. In a DRaaS scenario, the customer may manage and
have complete control over the production data. The Cloud Service Provider (CSP) may provide a
partial or completely managed service. In either case, the CSP must ensure the availability of the data
and adapt as the customers infrastructure changes. An advantage of this model is the CSP has
dedicated resources skilled in DR operations.
DRS (vSphere) Enables balancing computing workloads with available resources in a VMware vCenter cluster.
Emergency Covers the immediate response to a situation or set of circumstances that present a clear and present
Management threat to the safety of personnel or other assets of the organization.
Estimated Recovery This is the estimated timings based on full resource provision available during a live invocation. This
Time (ERT) time typically sits between the Net Recovery Time and the Recovery Time Achieved (RTA) time.
489
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
ESX/ESXi (vSphere) Bare-metal hypervisor from VMware, meaning it installs directly on top of the physical server and
partitions it into multiple virtual machines that can run simultaneously, sharing the physical resources
of the underlying server. ESXi is the most recent version.
Extended DR includes the ability to configure both disaster recovery and Long Term Retention for the
protected virtual machines in the VPG, according to a user-defined data retention policy.
High Availability VMware high availability decreases downtime and improves reliability with business continuity by
(VMHA) enabling another ESX/ESXi host to start up virtual machines that were running on another ESX/ESXi
host that went down. High availability is automatically disabled by Zerto Virtual Replication while
updating recovered virtual machines in the recovery site from the VRA journal. After the promotion of
the data from the journal to the virtual machine completes, high availability is automatically re-
enabled. The HA configuration can include admission control to prevent virtual machines being
started if they violate availability constraints. If this is the case, then a failover, test failover or
migration of the virtual machines in a VPG to the cluster with this configuration will fail, if the
availability constraints are violated when the virtual machines are recovered.
Hyper-V A hybrid hypervisor, which is installed in the operating system. However, during installation it
redesigns the operating system architecture and becomes just like a next layer on the physical
hardware.
Hypervisor The host for multiple VMs in a virtualized environment. vSphere, ESX/ESXi, is the VMware brand
hypervisor. The hypervisor is the virtualization architecture layer that allows multiple operating
systems, termed guests, to run concurrently on a host computer.
Hypervisor Manager The tool used to manage the host. For example VMware vCenter Server and Microsoft SCVMM.
I/O (Input/Output) Describes any operation, program, or device that transfers data to or from a computer. Typical I/O
devices are printers, hard disks, keyboards, and mouses. In fact, some devices are basically input-only
devices (keyboards and mouses); others are primarily output-only devices (printers); and others
provide both input and output of data (hard disks, diskettes, writable CD-ROMs). In computer
architecture, the combination of the CPU and main memory (memory that the CPU can read and write
to directly, with individual instructions) is considered the brain of a computer, and from that point of
view any transfer of information from or to that combination, for example to or from a disk drive, is
considered I/O.
In-Cloud DR (ICDR) A disaster recovery solution that incorporates a service provider to replace or augment the
organization’s data protection implementation. When customers leverage an ICDR service, the CSP
hosts the production and DR sites. The virtual machines (VMs) are typically replicated from one CSP
datacenter to another CSP datacenter as a managed service or as managed co-located datacenters.
The customers have the ability to interact with their applications as if they were locally hosted.
Initial Sync1 Synchronization performed after creating the VPG to ensure that the protected disks and recovery
disks are the same. Recovery operations cannot occur until after the initial synchronization has
completed.
Adding a virtual machine to a VPG is equivalent to creating a new VPG and an initial synchronization
is performed. In this case, any checkpoints in the journal become unusable and only new checkpoints
added after the initial synchronization completes can be used in a recovery. The data in the journal
however remains and is promoted to the recovered virtual machine as part of a recovery procedure.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
iSCSI An Internet Protocol (IP)-based storage networking standard for linking data storage facilities. By
carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and
to manage storage over long distances.
490
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
Journal Every write to a protected virtual machine is intercepted by Zerto Virtual Replication and a copy of the
write is sent, asynchronously, to the recovery site, while the write continues to be processed on the
protected site. On the recovery site the write is written to a journal managed by the Virtual Replication
Appliance. Each protected virtual machine has its own journal.
Each journal can expand to a size specified in the VPG definition and automatically shrinks when the
expanded size is not needed.
Long Term Retention Providing Zerto customers a comprehensive Data Protection solution - preserve their virtualized
environment production data, for a long period - from months to several years.
The data is copied from the Recovery site, to a local or remotely attached storage repository, without
any impact on production data or performance, via a single management platform.
Data Retention is enforced by built-in scheduling and retention mechanisms. Data can later be
restored easily, and with minimal RTO.
LUN Disk drives are the foundation of data storage, but operating systems cannot use physical disk storage
directly. The platters, heads, tracks and sectors of a physical disk drive must be translated into a
logical space, which an OS sees as a linear address space comprised of fixed-size blocks. This
translation creates a logical entity that allows operating systems to read/write files. Storage networks
must also partition their physical disks into logical entities so that host servers can access storage
area network (SAN) storage. Each logical portion is called a logical unit number (LUN). A LUN is a
logical entity that converts raw physical disk space into logical storage space, which a host server's OS
can access and use. Any computer user recognizes the logical drive letter that has been carved out of
their disk drive. For example, a computer may boot from the C: drive and access file data from a
different D: drive. LUNs do the same basic job.
Level of Business The reduced level of service that has been agreed if there is an interruption to business operations.
Continuity
Managed Service See Cloud Service Provider (CSP).
Provider (MSP)
Maximum Tolerable The maximum tolerable data loss an organization can endure without compromising its business
Data Loss objectives.
Maximum Tolerable The maximum time after which an outage will compromise the ability of the organization to achieve
Outage (MTO) its business objectives.
Maximum Tolerable The duration after which an organization's viability will be irrevocably threatened if product and
Period of Disruption service delivery cannot be resumed.
NAS A network-attached storage (NAS) device is a server that is dedicated to nothing more than file
sharing. NAS does not provide any of the activities that a server in a server-centric system typically
provides, such as e-mail, authentication or file management. NAS allows more hard disk storage
space to be added to a network that already utilizes servers without shutting them down for
maintenance and upgrades. With a NAS device, storage is not an integral part of the server. Instead, in
this storage-centric design, the server still handles all of the processing of data but a NAS device
delivers the data to the user. A NAS device does not need to be located within the server but can exist
anywhere in a LAN and can be made up of multiple networked NAS devices.
Net Recovery Time The net time achieved in recovering one or more VPGs after a disaster.
Operational Level The agreement between the service management and the Service Provision Partners. It defines the
Agreement (OLA) responsibilities for support and delivery of the services provided.
Pair Zerto Virtual Replication can be installed at one or more sites and each of these sites can connect to
any of the other sites enabling enterprises to protect virtual machines across multiple vCenters or
within the same vCenter. Two sites connected to each other are considered paired. Also see
Replication to Self.
491
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
Preseed A virtual disk (a. vmdk flat file and descriptor or a .vhdx file) in the recovery site that has been
prepared with a copy of the protected data. Using this option is recommended particularly for large
disks so that the initial synchronization is much faster. When not using a preseeded disk the initial
synchronization phase has to copy the whole disk over the WAN. Zerto Virtual Replication takes
ownership of the preseeded disk, moving it from its source folder to the folder used by the VRA.
Quiesce Pausing or altering the state of running processes on a computer, particularly those that might modify
information stored on disk during a backup, in order to guarantee a consistent and usable backup.
Critical applications, such as databases have quiescent mechanisms that Zerto Virtual Replication can
use to get application consistent checkpoints.
RBAC Role-based Access control, available in the Zerto Cloud Manager via the Permissions tab.
RDM (vSphere) RDM is a mapping file in a separate VMFS volume that acts as a proxy for a raw physical storage
device. The RDM allows a virtual machine to directly access and use the storage device. The RDM
contains metadata for managing and redirecting disk access to the physical device.
The file gives you some of the advantages of direct access to a physical device while keeping some
advantages of a virtual disk in VMFS. As a result, it merges VMFS manageability with raw device
access.
Zerto Virtual Replication supports both physical and virtual mode RDMs.
Recovery Point The maximum amount of data that may be lost when the activity or service is restored after an
Objective (RPO) interruption. Expressed as a length of time before the interruption.
Recovery Time The actual times achieved during a DR test.
Achieved (RTA)
Recovery Time Related to downtime. The metric refers to the amount of time it takes to recover from a data loss
Objective (RTO) event and how long it takes to return to service. The metric is an indication of the amount of time the
system's data is unavailable or inaccessible, thus preventing normal service.
Replication, Technique for replicating data between databases or file systems where the system being replicated
Asynchronous does not wait for the data to have been recorded on the duplicate system before proceeding.
Asynchronous Replication has the advantage of speed, at the increased risk of data loss during due to
communication or duplicate system failure.
Replication to Self When a single vCenter is used, for example with remote branch offices, when replicating from one
datacenter to another datacenter, both managed by the same vCenter Server, you have to enable
replication to the same vCenter Server and pairing is not required.
Resource The elements (such as staff, site, data, IT systems) that are required to deliver an activity or service.
Resource Recovery Contains the instructions, procedures and guidelines to recover one or more resources and return
Plan conditions to a level of operation that is acceptable to the organization. Recovery Plans include
detailed recovery procedures for IT equipment and infrastructure.
Rolling Back Rolling back to an initial status, for example, after canceling a cloning operation on the VPG.
RPO See Recovery Point Objective (RPO).
RTO See Recovery Time Objective (RTO).
SAN A storage area network (SAN) is any high-performance network whose primary purpose is to enable
storage devices to communicate with computer systems and with each other. A storage device is a
machine that contains nothing but a disk or disks for storing data. A SAN's architecture works in a way
that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are
added to a SAN, they too will be accessible from any server in the larger network. In this case, the
server merely acts as a pathway between the end user and the stored data. Because stored data does
not reside directly on any of a network's servers, server power is utilized for business applications, and
network capacity is released to the end user.
492
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
SCSI Acronym for Small Computer System Interface. SCSI is a parallel interface standard used by many
servers for attaching peripheral devices to computers. SCSI interfaces provide for faster data
transmission rates (up to 80 megabytes per second) than standard serial and parallel ports. In
addition, you can attach many devices to a single SCSI port, so that SCSI is really an I/O bus rather
than simply an interface.
SCVMM A Microsoft management solution for the virtualized datacenter, enabling you to configure and
manage your virtualization host, networking, and storage resources in order to create and deploy
virtual machines and services to private clouds that you have created.
Secret Access Key A password. The Secret Access Key with the Access Key forms a secure information set that confirms
(AWS) the user's identity.
Security Group A virtual firewall that controls the traffic for one or more instances.
Service Continuity The continuity plan that acts as an umbrella document for a service, referencing other plans as
Plan required and providing service-specific emergency management and recovery plans.
Service Level The agreement between the customer and service provider which defines the service that is to be
Agreement (SLA) delivered to the customer.
Service Profile A predefined set of default properties to use when VPGs are defined or edited. Zerto provides a
default service profile and the option for the organization to specify their own requirements. The cloud
service provider can define service profiles to manage specific service level agreements (SLAs) with
its customers.
Service Test Plan Detailed plan defining the activities required to test the recovery of an individual IT service to meet
business requirements documented in the RTO and RPO.
Shadow VRA During normal operation, a VRA might require more disks than a single virtual machine can support. If
this situation arises, the VRA creates new shadow VRA virtual machines, used by the VRA to maintain
additional disks. These virtual machines must not be removed. A VRA can manage a maximum of
1500 volumes, whether these are volumes being protected or recovered.
Snapshots A snapshot is a block device which presents an exact copy of a logical volume, frozen at some point in
time. Typically this would be used when some batch processing, a retention process for instance,
needs to be performed on the logical volume, but you don't want to halt a live system that is changing
the data. Zerto does NOT use a snapshot mechanism, but is constantly replicating data writes.
Storage Account Storage accounts re like a container for your files. You can name your storage account the way you
(Azure) like but it should be unique across the Azure system.
Subnet A logical, visible subdivision of an IP network.[1] The practice of dividing a network into two or more
networks is called subnetting.
Subscription (Azure) The description uses information derived from the following site:
https://blogs.msdn.microsoft.com/arunrakwal/2012/04/09/create-windows-azure-subscription/
An Azure subscription grants access to Azure services and Platform Management Portal. A
subscription has two aspects:
■ The Windows Azure account, through which resource usage is reported and services are billed.
■ The subscription itself, which governs access to and use of the Azure services that are subscribed
to.
System Center Virtual See SCVMM.
Machine Manager
Virtual Machine (VM) A virtual machine (VM) is an environment, usually a program or operating system, which does not
physically exist but is created within another environment. In this context, a VM is called a guest while
the environment it runs within is called a host.
Virtual Network A virtual network dedicated to an Azure subscription.
(VNet) (Azure)
493
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
Virtual Private Cloud An on demand configurable pool of shared computing resources allocated within a public cloud
(VPC) (AWS) environment, providing a certain level of isolation between the different organizations (denoted as
users hereafter) using the resources. The isolation between one VPC user and all other users of the
same cloud (other VPC users as well as other public cloud users) is achieved normally through
allocation of a Private IP Subnet and a virtual communication construct (such as a VLAN or a set of
encrypted communication channels) per user.
Virtual Protection See VPG.
Group
Virtual Replication See VRA.
Appliance
VMDK, Virtual Virtual Machines created with VMware products typically use virtual disks. The virtual disks, stored
Machine Disk as files on the host computer or remote storage device, appear to the guest operating systems as
standard disk drives.
Volume Delta Sync1 Synchronization when only delta changes for a volume needs synchronizing, for example, when a
virtual machine is added to a VPG using a preseeded disk.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Delta Sync.
For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Volume Full Sync1 Synchronization when a full synchronization is required on a single volume.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Full Sync.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Volume Initial Sync1 Synchronization when a full synchronization is required on a single volume, for example, when
changing the target datastore or adding a virtual machine to the VPG without using a preseeded (not
available in the cloud) disk.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Initial Sync.
For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
VPG Virtual machines are protected in virtual protection groups. A virtual protection groups (VPG) is a
group of virtual machines that you want to group together for replication purposes. For example, the
virtual machines that comprise an application like Microsoft Exchange, where one virtual machine is
used for the software, one for the database and a third for the Web Server, require that all three virtual
machines are replicated to maintain data integrity.
VRA A virtual machine installed on each hypervisor hosting virtual machines to be protected or recovered,
that manages the replication of protected virtual machine writes across sites. A VRA must be installed
on every hypervisor that hosts virtual machines that require protecting in the protected site and on
every hypervisor that will host the replicated virtual machines in the recovery site.
vSphere VMware’s server virtualization platform for building a cloud infrastructure.
494
Zerto Virtual Manager Administration Guide for VMware vSphere Environments -Version 7.0
Glossary
Zerto Cloud Connector A virtual machine installed on the cloud side, one for each customer organization replication network.
(ZCC) The Zerto Cloud Connector requires both cloud-facing and customer-facing static IP addresses. The
ZCC routes traffic between the customer network and the cloud replication network, in a secure
manner ensuring complete separation between the customer network and the cloud service provider
network. The ZCC has two Ethernet interfaces, one to the customer’s network and one to the cloud
service provider's network. Within the cloud connector a bidirectional connection is created between
the customer and cloud service provider networks. Thus, all network traffic passes through the ZCC,
where the incoming traffic on the customer network is automatically configured to IP addresses of the
cloud service provider network.
Zerto Cloud Manager A Windows service, which enables managing all the cloud sites offering disaster recovery using a
(ZCM) single interface. The ZCM manages the DR either as a service (DRaaS) or completely within the cloud
environment, protecting on one cloud site and recovering to a second site (ICDR).
Zerto User Interface Recovery using Zerto Virtual Replication is managed via a user interface: in a browser via the Zerto
Virtual Manager Web Client, or in either the vSphere Web Client or vSphere Client console in the
Zerto tab.
Zerto Self-service An out-of-the-box DR portal solution with a fully functioning browser-based service portal to enable
Portal (ZSSP) cloud service providers to quickly introduce disaster recovery as part of their portal offering.
Zerto Virtual Backup A Windows service that manages File Level Recovery operations within Zerto Virtual Replication.
Appliance (VBA) These repositories can be local or on a shared network.
Zerto Virtual Manager A Windows service, which manages everything required for the replication between the protection
(ZVM) and recovery sites, except for the actual replication of data. The ZVM interacts with the vCenter
Server to get the inventory of VMs, disks, networks, hosts, etc. The ZVM also monitors changes in the
VMware environment and responds accordingly. For example, a vMotion operation of a protected VM
from one host to another is intercepted by the ZVM so the Zerto User Interface is updated
accordingly.
ZORG, Zerto Cloud customers are defined to Zerto Cloud Manager as Zerto organizations, ZORGs. A ZORG is
Organization defined with the cloud resources it can use, the permissions that it has to perform operations, such as
testing a failover or defining a VPG.
1. Synchronization after a recovery starts after the promotion of data from the journal to the virtual machine disks ends. Thus, synchronization of virtual ma-
chines can start at different times, dependent on when the promotion for the virtual machine ends. All synchronizations are done in parallel, whether a delta
sync or full sync, etc.
495
INDEX
A cluster .............................................................................................416
affinity rules ...........................................272, 277, 278, 279, 417 commit policy
alerts .............................................................................................. 429 changing ................................................................................. 313
email settings ........................................................................315 for failover and move .........................................................482
in Dashboard .........................................................................218 for live DR test ...................................................................... 331
in single VPG tab .................................................................222 for move ................................................................................ 337
in single VRA tab ..................................................................231 site setting ............................................................................482
AMQP compression
Erlang OTP ............................................................................436 to minimize bandwidth .........................................................25
installation .............................................................................436 connecting sites, see pairing
RabbitMQ ..............................................................................436 connectivity between Zerto components, checking ...........281
application-consistent checkpoints ........................................252
architecture ......................................................................................10 D
AWS Dashboard ...................................................................................... 30
defining offsite backup ............................................... 105, 116 alerts, events, and running tasks ........................... 218, 222
editing VPG settings .................................................450, 451 performance graphs ............................................................ 217
limitations .............................................................................243 stopping a failover test ...................................................... 328
re-IP process .............................................104, 116, 208, 214 data compression ...............................51, 76, 122, 142, 164, 185
Azure datastore maintenance ..............................................................266
limitations ............................................................................ 244 ddb.geometry.biosSectors ........................................................... 41
ddb.geometry.sectors ................................................................... 41
B default disk geometry ................................................................... 41
backup default gateway, configuring .................. 65, 88, 177, 196, 452
creating a repository ..........................................................369 delta sync ....................................................................................... 251
backups, see offsite backup definition ............................................................................... 263
bandwidth .............................................................................311, 480 diagnostics utility, functions ................................................... 404
freeing up ............................................................................. 250 disaster recovery
in resources report ..............................................................397 during a test ......................................................................... 354
site settings ..................................................................311, 480 types ..........................................................................................35
bitmap sync ...........................................262, 272, 277, 279, 488 disk
definition ................................................................................262 IDE ............................................................................................ 40
boot order insufficient space ................................................................403
configuring ............................................. 48, 73, 99, 111, 429 RDM ...58, 59, 82, 83, 129, 130, 150, 151, 171, 172, 190,
branding the Recovery report ..................................................396 191, ..............357, 440, 441, 456, 457, 461, 462
SCSI .......................................................................................... 40
disk size
C
estimating ..... 58, 82, 129, 150, 171, 190, 440, 456, 461
change rate
diskbox, see shadow VRA ......................................................... 267
estimating .....58, 82, 129, 150, 171, 190, 440, 456, 461
checkpoint ........................................................252, 356, 421, 433
adding manually ..................................................................253 E
application-consistent .......................................................252 EBS disks (AWS) ................................................92, 93, 200, 201
choosing ............................................................ 327, 356, 357 EC2 (AWS) ..........................................................92, 93, 200, 201
renaming after testing failover ........................................329 email settings ................................................................................314
Chrome ............................................................................................ 26 configure ................................................................................314
clock synchronization with NTP .................................... 317, 470 for alerts and backup reports ............................................ 315
cloning enable replication to self
description ............................................................................355 site setting .................................................................... 68, 482
to Hyper-V ............................................................................357 environment variable .................................................................254
to VMware vSphere ............................................................357 ZertoForce ............................................................................ 254
ZertoOperation ...................................................................254
ZertoVCenterIP ...................................................................254
496
ZertoVCenterPort ...............................................................254 history in VPG tab ................................................................ 221
ZertoVPGName ...................................................................254 location .................................................................................... 42
events sizing ........................................................................................ 42
in Dashboard .........................................................................218
in single VPG tab ........................................................218, 222 K
in single VRA tab ..................................................................231 Keep Source VMs .............................................................335, 340
export to CSV, VPG details ...................................................... 220
L
F license .............................................................................................316
failback updating ................................................................................. 317
after failover .........................................................................346 logs .................................................................................................. 410
description .............................................................................321 collecting .....................................................................405–410
enable after failover ............................................................349 description ............................................................................ 410
enable after move ...............................................................338 Long Term Repository
failover .............................................................................................351 editing .................................................................370, 371, 445
commit policy ............................................................. 313, 482 Long Term Retention
during a test ..........................................................................354 manually running job ......................................................... 374
failback ...................................................................................349 long term retention ........................................................................36
report ......................................................................................395 manually running job ......................................................... 374
scratch volume ......................................................................351
stopping a test .....................................................................328
testing ..........................................................................324, 327 M
topology .................................................................................350 MAC address ................................................................................134
failover test ...................................................................................327 Microsoft SQL Server Database, reconfiguring ..................284
failover tests report .....................................................................395 migration, see move
file recovery ..................................................................................358 modify volumes ...........................................................................249
Firefox ............................................................................................... 26 RDM .......................................................................................249
folder recovery .............................................................................358 monitor
force delete of VPG .....................................................................252 alerts, events, and running tasks ........................... 218, 222
full synchronization site .......................................................................................... 228
for volumes ...........................................................................265 virtual machines .................................................................. 226
VPG ................................................................................218, 221
VPGs tab ................................................................................218
G VRA ......................................................................................... 231
geometry ..........................................................................................41 move ............................................................................................... 339
geometry, non-default ..59, 83, 130, 151, 172, 191, 441, 457, commit policy .............................................................313, 482
462 description ............................................................................ 335
ghost VRA .....................................................................................278 failing back ............................................................................ 338
glossary ...............................................................................488–495 initiating ................................................................................. 337
reverse replication .............................................................. 338
H using a scratch volume ...................................................... 339
HA, see high availability
high availability ............................................................................ 416 N
HTTPS ............................................................................................285 NAT rules .......................................................................................154
needs configuration ....................................................................264
I troubleshooting ...................................................................402
IDE devices .......................................................................................41 network
IDE disks ..........................................................................................40 for failing over or moving .......................... 62, 86, 175, 194
initial synchronization ..........................................................41, 251 for testing ...................................................... 62, 86, 175, 194
definition ............................................................................... 264 NIC
Internet Explorer, supported versions ...................................... 26 defining network details ....................................................469
J
journal .................................................75, 100, 113, 183, 205, 212
adding a checkpoint ............................................................253
497
NTP clock synchronization ............................................. 317, 470 recovery site, pairing .................................................................. 285
registration ....................................................................................316
O re-IP ............................................65, 88, 134, 156, 177, 196, 452
offsite backup ....................................................................... 36, 392 in AWS ...................................................... 104, 116, 208, 214
editing a repository ....................................................370, 371 vNIC configuration ............................................ 65, 177, 452
flow ........................................................................................... 36 Replication Pause Time .............................................................250
retention period .........................................................242, 392 replication to self ........................................................................... 68
running unscheduled ................................................375, 380 configuring .............................................................................. 68
status in single VPG tab .....................................................221 enabling ....................................................................................32
status in VPGs tab .................................................... 219, 220 reports
offsite backup repository Outbound Protection Over Time .................................... 393
creating ....................................................................... 369, 468 Protection Over Time by Site ...........................................394
offsite clone, see cloning Recovery ................................................................................ 395
Outbound Protection Over Time report ................................393 Resources .............................................................................. 397
Usage .................................................................................... 400
VPG Performance ............................................................... 401
P repository for offsite backup .................................369, 370, 371
pairing ...................................................................................285, 435 resize volumes .............................................................................249
pass-through disks ...................................................... 71, 341, 353 RDM .......................................................................................249
pause protection ......................................................................... 250 Resources report ......................................................................... 397
performance graphs configuring ............................................................................483
for a single VPG ....................................................................221 generating with REST API ................................................. 397
for a single VRA ....................................................................231 output ....................................................................................398
for a site ..................................................................................217 retention ...........................................................................................36
permissions in vCenter Server ................................................. 412 manually running job ......................................................... 374
PowerShell cmdlet retention period
Set-Checkpoint ....................................................................252 offsite backup ...................................................................... 392
preseed ..............41, 59, 83, 130, 151, 172, 191, 441, 457, 462 retention policy ............................................................................... 12
promotion of data ..........................................340, 352, 403, 417 reverse protection, see failback
hangs ..................................................................................... 403 reverse replication
when VRA fails ................................................................... 403 move ....................................................................................... 338
protected site, pairing ................................................................285 rollback
Protection Over Time by Site report ......................................394 setting for failover or move ............................................... 313
provisioned storage .......................................219, 227, 232, 234
S
R same site replication .................................................................... 68
RabbitMQ scratch volume ......................................................... 327, 339, 351
Erlang OTP ............................................................................436 scripts
installation .............................................................................436 creating ..................................................................................254
raw disk (RDM) ...... 58, 71, 82, 129, 150, 171, 190, 341, 353, execution timeout
440, ...................................................................................... 456, 461 advanced settings ........................................................ 313
modifying .............................................................................. 249 running ................................................................................... 253
recovery ZertoForce environment variable ................................... 254
during a test ..........................................................................354 ZertoOperation environment variable .......................... 254
report ......................................................................................395 ZertoVCenterIP environment variable .......................... 254
to Hyper-V ............................................................................... 71 ZertoVCenterPort environment variable ......................254
to same site ............................................................................ 68 ZertoVPGName environment variable .........................254
to VMware vCenter Server .................................................46 SCSI disks ........................................................................................ 40
to VMware vCloud Director .............................................. 118 security certificate
types ......................................................................................... 35 adding ...................................................................................... 28
recovery flows ................................................................................ 35 replacing ................................................................................ 285
recovery host, changing .............................................................432
Recovery report ...........................................................................395
branding .................................................................................396
498
security group ..............................................................................243 for testing failover ............................................................... 327
self replication ................................................................................ 68 in Dashboard .........................................................................218
service profile ..................................................................................41 in Sites tab ............................................................................ 223
Set-Checkpoint cmdlet ..............................................................252 triggers
settings synchronization ................................................................... 259
importing VPG .....................................................................258 VPG synchronization ......................................................... 265
shadow VRA ...................................................................... 267, 493 troubleshooting
signature matching, WAN optimization ................................. 25 disk space .............................................................................403
site details VRA crashes during promotion .......................................403
monitoring ..............................................................................217 Zerto Virtual Manager service ........................................402
site information ........................................................................... 309
site settings U
commit policy ...................................................................... 482 usage
defining ................................................................................. 308 report .................................................................................... 400
email ....................................................................................... 314 Usage report ................................................................................ 400
enabling replication to self .................................................. 68
sites tab ..........................................................................................228
sizing V
volumes .........58, 82, 129, 150, 171, 190, 440, 456, 461 v
WAN ........................................................................................ 34 vApp network mapping ..............................................................154
status vCD guest customizing ......................................................133, 154
VPG .........................................................................................259 VIB .......................................................... 270, 275, 431, 434, 465
storage Virtual Backup Appliance, see VBA
for replicated data 57, 81, 128, 149, 170, 189, 439, 455, virtual machine
................................................................................. 460 modify RDM .........................................................................249
provisioned ..............................................219, 227, 232, 234 modify volumes ...................................................................249
sizing .............. 57, 81, 128, 149, 170, 189, 439, 455, 460 modifying replication settings .........................................446
storage profile ..............................................................................399 monitoring ............................................................................ 226
Storage vMotion .......................................................................... 417 virtual protection group, see VPG
subnet .............................................................................................243 Virtual Replication Appliance, see VRA
summary tab ..................................................................................217 VM in Several VPGs ... 41, 47, 72, 98, 110, 119, 139, 161, 181,
synchronization 203, ........................................................ 210, 243, 246, 247, 335
delta ...... 57, 81, 128, 149, 170, 189, 251, 439, 455, 460 VMDK size limitations
forcing ................................................................................... 250 adjusting .................................................................................. 34
full ............................................................................................265 vMotion ..........................................................................................417
initial ................................................................................ 43, 251 VMware high availability (VMHA) .........................................416
synchronization triggers VMware host maintenance ...................................................... 278
VPG ...............................................................................259, 265 VMware vCenter Server
cloning to it ........................................................................... 357
vNIC
T configuring ....................................................................134, 155
tasks ................................................................................................224 configuring re-IP .................................................................... 88
test failover ...................................................................................324 vNIC configuration
initiating .................................................................................354 re-IP ....................................................................... 65, 177, 452
process ...................................................................................324 volume
scratch volume .....................................................................327 estimating size 58, 82, 129, 150, 171, 190, 440, 456, 461
stopping .................................................................................328 full synchronization ............................................................ 265
test scratch volume ....................................................................327 VPC (AWS) .................................................................................. 243
thin provisioning .......................................................................... 415 VPG
throttling .......................................................................................... 25 add a virtual machine .....................................243, 246, 247
setting ......................................................................................311 add a virtual machine via a vSphere console ................. 69
site settings ..................................................................311, 480 creating to AWS ..................................................................... 91
time-based bandwidth throttling creating to Hyper-V .............................................................. 71
site settings ................................................................. 312, 480 creating to same site ............................................................ 68
topology creating to vCenter Server ...........................................46, 67
for failover .............................................................................350 definition ..........................................................................35, 40
for move .................................................................................339
499
deleting ...................................................................................251 Z
editing ..........................................................................450, 451 Zerto User Interface
handling error ........................................................................251 configuration .......................................................................... 30
importing settings ...............................................................258 customizing ..............................................................................31
modify .................................................................................... 241 Zerto Virtual Manager .................................................................. 10
monitoring .................................................................... 218, 221 Windows service ................................................................402
pausing protection ............................................................. 250 Zerto Virtual Manager Web Client ...........................................26
saving details to file ........................................................... 220 Zerto Virtual Replication
synchronization triggers ..........................................259, 265 architecture ............................................................................. 10
synchronize .......................................................................... 250 benefits .....................................................................................23
synchronizing ...................................................................... 250 definition ....................................................................................9
testing ....................................................................................324 how it works ............................................................................. 11
VPG Performance report ........................................................... 401 logs ......................................................................................... 410
VPG status ....................................................................................259 monitoring .............................................................................216
VPG waiting to be removed .............................................252 ZertoForce script .........................................................................254
VPG waiting to be removed ZertoOperation script ................................................................254
force delete ...........................................................................252 ZertoVCenterIP script ................................................................254
VPGs tab ZertoVCenterPort script ...........................................................254
monitoring ..............................................................................218 ZertoVPGName script ...............................................................254
VRA .................................................................................... 11, 12, 493 ZORG
changing recovery host .....................................................432 preseeding .... 60, 84, 131, 152, 173, 192, 442, 458, 463
crash during promotion .................................................... 403 ZVM, see Zerto Virtual Manager
edit connection method ....................................................275
edit host password .............................................................275
editing settings ....................................................................273
ghost .......................................................................................278
monitoring ..............................................................................231
shadow VRA .........................................................................267
uninstalling ..................................................................277–278
upgrading ....................................................................... 272–??
vSphere Client console .........................................................27, 69
vSphere Web Client ...............................................................27, 69
working with Zerto Virtual Replication ........................... 27
vStorage
thin provisioning .................................................................. 415
W
WAN
compressing traffic ....................51, 76, 122, 142, 164, 185
signature matching ............................................................... 25
WAN bandwidth, freeing up ................................................... 250
WAN optimization ........................................................................ 25
WAN sizing ..................................................................................... 34
Windows service
Zerto Virtual Manager ...................................................... 402
Zerto helps customers accelerate IT transformation by eliminating the risk and complexity of modernization and cloud For assistance using
adoption. By replacing multiple legacy solutions with a single IT Resilience PlatformTM, Zerto is changing the way di- Zerto Virtual Replication
saster recovery, backup and cloud are managed. At enterprise scale, Zerto's software platform delivers continuous software, contact:
availability for an always-on customer experience while simplifying workload mobility to protect, recover and move ap- @Zerto Support.
plications freely across hybrid and multi-clouds. Zerto is trusted by over 6,000 customers globally and is powering
resiliency offerings for Microsoft Azure, IBM Cloud, AWS, SunGard AS and more than 350 cloud services providers.