This session was recorded at the London VMUG, it consists of two modules. The first module will point out what happens when people are configuring a VMware vSphere cluster with HA without specifying a slot size. The second module will show what happens when a host becomes isolated in an VMware vSphere HA cluster and where the heartbeats are used for.
This session was recorded at the London VMUG Thursday January 24th. If you want a copy of the original PPT there's a download link available in the next article: London is the Place for Me
vSphere Data Protection (VDP) is a robust, simple-to-deploy, disk-based backup and recovery solution. vSphere Data Protection is fully integrated with VMware vCenter Server and enables centralized and efficient management of backup jobs while storing backups in deduplicated destination storage.
The benefits of vSphere Data Protection are:
Provides fast and efficient data protection for all of your virtual machines, even those powered off or moved between physical hosts.
Significantly reduces disk space consumed by backup data using smart deduplication across all backups.
Reduces the cost of backing up virtual machines and minimizes the backup window using change block tracking and VMware virtual machine snapshots.
Allows for easy backups without the need for third-party agents installed in each virtual machine.
Uses a simple straight-forward installation as an integrated component within vSphere, that can be managed by a web portal.
Direct access to vSphere Data Protection configuration integrated into the standard vSphere Web Client.
Protects backups with checkpoint and rollback mechanisms.
Provides simplified recovery of Windows and Linux files with end-user initiated file level recoveries from a web-based interface.
The VMware vSphere Web Client interface is used to select, schedule, configure, and manage backups and recoveries of virtual machines. During a backup, vSphere Data Protection creates a quiesced snapshot of the virtual machine. Deduplication is automatically performed with every backup operation.
The following terms are used throughout this document in the context of backup and recovery.
A datastore is a virtual representation of a combination of underlying physical storage resources in the datacenter.
A datastore is the storage location (for example, a physical disk, a RAID, or a SAN) for virtual machine files.
Changed Block Tracking (CBT) is a VMkernel feature that keeps track of the storage blocks of virtual machines as they change over time. The VMkernel keeps track of block changes on virtual machines, which enhances the backup process for applications that have been developed to take advantage of VMware’s vStorage APIs.
VMware vStorage APIs for Data Protection (VADP) enables backup software to perform centralized VM backups without the disruption and overhead of running backup tasks from inside each virtual machine.
Virtual Machine Disk (VMDK) is a file or set of files that appears as a physical disk drive to a guest operating system. These files can be on the host machine or on a remote file system.
The vSphere Data Protection appliance is a purpose built virtual appliance for vSphere data protection.
vSphere Data Protection Advanced (VDP Advanced) – Is a new standalone product sold separately from vSphere – It extends the capabilities of VDP with greater scalability and integration with business-critical applications to protect midsize vSphere environments. VDP Advanced provides fast agent-less image-level backups, as well as guest-level application-consistent protection of Microsoft® SQL Server™ and Microsoft® Exchange Server™.
VMware vCenter Server Heartbeat delivers high availability for VMware vCenter Server, protecting virtual infrastructure from application, configuration, operating system, network and hardware-related problems. Protect VMware vCenter Server and its database against all types of planned and unplanned downtime with seamless, rapid failover and failback on both physical and virtual platforms. Proactively monitor VMware vCenter Server and ensure seamless failover and failback of for in local and remote locations.
This video created by Peter Boone and Jody Wilson demonstrates installing vCenter Server Heartbeat and also validating the installation.
You can grow your IT skills with free training, expertise, and insights on VMware products, all in one convenient location.
VMware has released some great instructional videos – freely accessible, these short technical videos allow VMware technical experts to provide tips and step-by-step instructions on product features, design best practices, configuring, deploying and running your virtual infrastructure.
vCenter Operations Manager defines attributes that are critical to the performance of an object as key performance indicators (KPI). KPI are weighted more heavily in the calculations that determine the health of an object. Graphs of KPI performance appear before other metrics in several areas of the product.
In this free video from our VMware vCenter Operations Manager Implementation Training, VCDX Jason Nash demonstrates how to use attributes and key performance indicators. In addition, he demonstrates how to configure the KPI, designate a metric as a KPI, and how to assign an attribute package to an application.
This free eLearning course provides the background information needed to work with the products included in the VMware Security Solution. The course begins with a review of basic security methodologies and how virtualization affects security. References for follow-on reading are provided for students less familiar with these concepts. Next, the course discusses the VMware security strategy. Each product in the VMware Security Solution is introduced by discussing the limitations of traditional security controls and describing how the products in the solution address these limitations. The course concludes with a list of relevant security and compliance online resources. After this course, you should be able to:
Recognize the process and strategies that security managers use to manage risks to information and information systems
Name ways that virtualization affects security and compliance
List the top vulnerabilities applicable to virtual environments
Explain the basic strategy to protect a virtual environment
Name the main purpose of each product included in the VMware security solution
For each product in the VMware security solution, discuss how key features address the challenges of securing virtual environments with traditional security controls.
Find additional security and compliance resources posted on vmwrae.com