Zerto Virtual Manager Azure Administration Guide
Zerto Virtual Manager Azure Administration Guide
Manager
Administration
Guide
Microsoft Azure Environment
The scripts are provided by example only and are not supported under any Zerto support program or service.
All examples and scripts are provided "as-is" without warranty of any kind. The author and Zerto further disclaim all implied warranties including, without
limitation, any implied warranties of merchantability or of fitness for a particular purpose.
In no event shall Zerto, its authors, or anyone else involved in the creation, production, or delivery of the scripts be liable for any damages whatsoever
(including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of
the use of or inability to use the sample scripts or documentation, even if the author or Zerto has been advised of the possibility of such damages. The entire
risk arising out of the use or performance of the sample scripts and documentation remains with you.
2
TABLE OF CONTENTS
3
Grid View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Monitoring a Single VPG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Monitoring Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Monitoring Protected Virtual Machines – The VMs Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Monitoring Sites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
The SITES Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Monitoring Repositories for Offsite Backups – The SETUP Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Monitoring Offsite Backups – The OFFSITE BACKUP Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
VPGs Tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
VMs Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
4
Defining Site Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119
Configuring Email Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Defining the Resource Report Sampling Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .121
Seeing What is Licensed. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
About the Zerto Virtual Replication Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
CHAPTER 17: FAILING BACK (MOVING) FROM AZURE TO AN ON-PREMISE SITE . . . . . . . . . . . . . . . 166
The Failback (Move) Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166
Initiating a Failback (Move) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
Reverse Protection For a Moved VPG . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Reverse Protection Specified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
5
Reverse Protection Not Specified . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
6
Edit vNIC Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Edit Volumes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Edit Volumes Dialog (vCD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Edit VRA Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .220
Manage Static Routes Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
New Repository Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Offsite Clone Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Open Support Ticket Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Remote Support Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Site Settings Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Site Information Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Policies Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Email Settings Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228
Reports Dialog. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
License Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
About Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
Stop Failover Test Dialog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
TASKS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
7
ABOUT THIS GUIDE
Zerto Virtual Replication provides a business continuity (BC) and disaster recovery (DR) solution in a virtual environment,
providing near real-time replication, with write-order fidelity, with minimal impact on product workloads. Fully automated
orchestration delivers failover and failback in one click. Non-disruptive disaster recovery testing gives you confidence that your
DR solution will work predictably and consistently. Protection groups ensure that all virtual machines that comprise an
application are protected in the exact same manner no matter where they are in the environment.
With support for different hypervisors, such as vSphere or Hyper-V, workloads can be protected, migrated, and recovered,
either within the same hypervisor environment or across hypervisor environments.
This guide describes how to configure and manage Zerto Virtual Replication to implement business continuity and disaster
recovery (DR) solutions in VMware, Hyper-V, Azure, or mixed environments.
Intended Audience
This guide is for the use of experienced hypervisor and Azure administrators.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
About This Guide 8
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
About This Guide
Disaster recovery is the process of preparing for recovery or continuation of IT processing tasks that support critical business
processes in the event of a threat to the IT infrastructure. Zerto Offsite Backup is the additional process of enabling recovery of
IT processing tasks after an extended period. This section describes Zerto Virtual Replication general concepts to enable
replication and recovery in a virtual environment.
The following topics are described in this section:
■ “What is Zerto Virtual Replication?”, below
■ “Zerto Virtual Replication Architecture”, on page 10
■ “How Zerto Virtual Replication Recovery Works”, on page 11
■ “Benefits of Using Zerto Virtual Replication”, on page 12
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Introduction to Zerto Virtual Replication 10
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Introduction to Zerto Virtual Replication
responds accordingly. For example, a VMware vMotion operation, or Microsoft Live Migration of a protected VM from one
host to another is intercepted by the ZVM and the Zerto User Interface is updated accordingly.
A Zerto Virtual Manager can manage up to 5000 virtual machines, either being protected by, or recovered to, the Zerto Virtual
Manager.
Virtual Replication Appliance (VRA) – A Windows service that manages the replication of data from protected virtual
machines to Azure. A VRA can manage a maximum of 1500 volumes, whether these are volumes being protected or recovered.
Virtual Backup Appliance (VBA) – A VBA is a Windows service, which manages back-ups within Zerto Virtual Replication. The
VBA service runs on the same machine as the Zerto Virtual Manager service and is responsible for the repositories where
offsite backups are stored. These repositories can be local or on a shared network.
Zerto User Interface – Recovery using Zerto Virtual Replication is managed in a browser.
The following diagram shows how the main Zerto Virtual Replication components are deployed across hypervisor-based
enterprise sites to provide disaster recovery across these sites.
When you plan to recover the enterprise site to a public cloud, Zerto Virtual Replication is installed in the cloud environment.
Zerto Virtual Replication comprises the same components but the VRA runs as a service, so that the ZVM, VRA, and VBA all
run as services on a single virtual machine instance in the public cloud.
Note: For the architecture diagrams when one of the sites is a cloud service provider, see the Zerto Cloud Manager
Administration Guide.
Every write is copied by Zerto Virtual Replication and sent, asynchronously, to the recovery site, while the write continues to be
processed on the protected site. For greater efficiency and performance, the write can be compressed before being sent to the
recovery site with throttling techniques being used to prioritize network traffic.
On the recovery site the write is written to a journal managed by a Virtual Replication Appliance (VRA). Each protected virtual
machine has its own journal. Every few seconds, a checkpoint is also written to each journal. These checkpoints ensure write
order fidelity and crash-consistency to each checkpoint. During recovery you pick one of these crash-consistent checkpoints
and recover to this point. Additionally, checkpoints can be manually added by the administrator, with a description of the
checkpoint. For example, when an event is going to take place that might result in the need to perform a recovery, you can
pinpoint when this event occurs as a checkpoint written to each journal.
The VRA manages the journals for every virtual machine that will be recovered to the hypervisor hosting that VRA. It also
manages images of the protected volumes for these virtual machines. During a failover, you can specify that you want to
recover the virtual machines in the VPG using the last checkpoint or you can specify an earlier checkpoint, in which case the
recovery of the mirror images under the VRA are synchronized to this checkpoint. Thus, you can recover the environment to
the point before any corruption and ignore later writes in the journal that were corrupted, regardless of the cause of the
corruption, such as a crash in the protected site or a virus attack.
When recovery to a point is required that is further in the past than the time saved in the journal, an offsite backup can be
restored. Offsite backups are an extension of disaster recovery, with the virtual machine files, such as the configuration and
virtual disk files, saved to a repository for up to one year. These files are then used to restore the virtual machines to the point
of the stored offsite backup at the recovery site.
Hardware Agnostic
Because Zerto Virtual Replication software manages recovery of virtual machines and virtual disks only, it does not matter
what hardware is used in either the protected or recovery sites; it can be from the same vendor or different vendors. With Zerto
Virtual Replication the logical storage is separated from the physical storage so that the vendor and actual type of storage
hardware do not need to be considered.
Zerto Virtual Replication provides a workload mobility and protection layer providing seamless connectivity, portability,
protection, orchestration, and application encapsulation of workloads across clouds without vendor lock-in. High scale, mission
critical applications, and data are encapsulated, as well as features, specifications, and configurations, and can be seamlessly
migrated across different servers, storage, hypervisors, and clouds without any disruption to business services.
With Zerto Virtual Replication, IT managers can choose the right infrastructure for the right use case for the right price. One
application can leverage several different environments for disaster recovery, bursting, production, backup, testing, and
development. With Zerto Virtual Replication there is no vendor lock-in to a cloud, technology, or vendor. Any choice, any cloud,
any technology, any price, any service level is available in minutes for any workload.
One-Click Migration
Application migrations can be resource intensive projects that take weeks of planning, execution, and downtime. With Zerto
Virtual Replication migrations are greatly simplified and can be completed without extended outages or maintenance windows
and across different types of hardware and even different hypervisors, such as VMware ESXi or Microsoft Hyper-V. Migrations
across different versions within a type of hypervisor, such as from a VMware vCenter environment to a vCloud environment or
even cross hypervisor migration, such as migration from a vCenter environment to a Hyper-V environment is as easy as a
migration from one site to another using the same hypervisor infrastructure.
Offsite Backup
Zerto Virtual Replication provides an offsite back up option that enables saving the protected virtual machines offsite for up to
one year in a state where they can be easily deployed. Because the backups use the same mechanism used for disaster
recovery, there is no performance impact on the production site, since the processing is performed on the recovery site. The
offsite backups are fixed points saved daily, weekly or monthly.
Note: Zerto recommends weekly backups.
Policy-based
In the protected site you define the virtual machines that you want to recover, either individually or as groups, as a virtual
protection group (VPG). The virtual machines that you include in the VPG can come from one or more hypervisor hosts. In this
way, you can protect applications that run on multiple virtual machines and disks as a single unit, in a single VPG.
Minimal RPO
Zerto Virtual Replication utilizes continuous data protection, sending a record of every write in the virtual protection group to
the recovery site. The transfer of this information is done over an optimized WAN asynchronously. If recovery is required, all
the data that was transferred to the recovery site is available resulting in recovery within the requested RPO.
DR Management Anywhere
With Zerto Virtual Replication everything is managed from a standalone browser-base user interface, enabling disaster
recovery management from anywhere using any device.
You manage the protection and replication of virtual machines between the protected site and Azure using the Zerto User
Interface. On first access to the Zerto User Interface, you might have to add a security certificate to set up secure
communication. Zerto also provides a set of RESTful APIs and PowerShell cmdlets to enable incorporating some of the disaster
recovery functionality within scripts or programs.
Note: Microsoft Windows Explorer 9 is not supported and version 10 does not work well with the user interface. Zerto
recommends using Chrome, Firefox, or later versions of Internet Explorer.
Note: It is required to exclude the Zerto Virtual Replication folder from antivirus scanning. Failure to do so may lead to the ZVR
folder being incorrectly identified as a threat and in some circumstances corrupt the ZVR folder.
Note:
Note: For a full list of requirements and limitations when protecting virtual machines to and from Azure see “Requirements for
Microsoft Azure Environments” on page 28
The following topics are described in this section:
■ “Using the Zerto Virtual Manager Web Client”, below
■ “Adding a Security Certificate for the Zerto User Interface”, on page 15
■ “Working With the Zerto User Interface”, on page 17
Communication between the Zerto Virtual Manager and the user interface uses HTTPS. On the first login to the Zerto User
Interface, you must install a security certificate in order to be able to continue working without each login requiring acceptance
of the security.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Accessing the Zerto User Interface 15
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Accessing the Zerto User Interface
3. Follow the wizard: Place all the certificates in the Trusted Root Certification Authorities store: Select the Place all
certificates in the following store option and browse to select the Trusted Root Certification Authorities store.
4. Continue to the end of the wizard. Click Yes when the Security Warning is displayed.
Sub tabs
The SETUP, OFFSITE BACKUP and MONITORING tabs and details of a specific VPG can be viewed from different perspectives
via subtables. For example, under SETUP you can manage repositories.
Views
Lists can be displayed with different views. For each view you can filter the information in columns via the filter icon next to
each column title. Clicking the column title enables sorting the column in ascending to descending order.
You can customize the default views or add a new view by clicking the view configuration button.
Customize a default view by selecting Show/Hide Columns and then checking the columns you want displayed. Create a new
view by selecting Create View.
Zerto Virtual Replication enables protecting virtual machines, for both disaster recovery or for extended, longer term recovery
from an offsite backup, by protecting the relevant virtual machines in virtual protection groups. A virtual protection group
(VPG) is a group comprised of virtual machines that are grouped together for recovery purposes. For example, the virtual
machines that comprise an application like Microsoft Exchange, where one virtual machine is used for the software, one for the
database, and a third for the Web Server require that all three virtual machines be replicated to maintain data integrity.
The following topics are described in this section:
■ “Flows for a Disaster Recovery Operations”, below
■ “Flow for a File or Folder Level Restore Operation”, on page 20
■ “Flow for an Offsite Backup and Restore Operation”, on page 20
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Overview of Recovery Flows 19
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Overview of Recovery Flows
Virtual machines are protected in virtual protection groups (VPGs). A VPG is a group of virtual machines that you group
together for recovery purposes. For example, the virtual machines that comprise an application like Microsoft Exchange, where
one virtual machine is used for the software, one for the database, and a third for the Web Server require that all three virtual
machines be replicated to maintain data integrity.
Any virtual machine whose operating system is supported in both the protected site and recovery site can be protected in a
VPG.
Once a virtual machine is protected, all changes made on the machine are replicated in the remote site. The replicated virtual
machines in the remote site can be recovered to any point in time defined for the VPG or if a period further in the past is
required, an offsite backup can be restored.
When a VPG is created, a replica of each virtual machine disk in the VPG is created under a VRA on the recovery site. These
replica virtual disks must be populated with the data in the protected virtual machines, which is done by synchronizing the
protected virtual machines with the recovery site replicas. The time taken for synchronization between the protected and
recovery sites will depend on the size of the virtual machines.
After the initial synchronization completes, only the writes to disk from the virtual machines in the protected site are sent to
Azure. These writes are stored by the Virtual Replication Appliance (VRA) in the journals in a storage account for a specified
period, after which they are promoted to the replica virtual disks managed by the VRA, which are also in storage account.
The number of VPGs that can be defined on a site is limited only by the number of virtual machines that can be protected. Each
site can manage a maximum of 300 virtual machines.
Note: If the total number of protected virtual machines on the paired sites is 300, then any additional machines are not
protected.
Note: For Linux machines, Azure Linux Agent must be installed.
The following topics are described in this section:
■ “Configuring Virtual Protection Groups”, below
■ “Requirements for Microsoft Azure Environments”, below
■ “The Role of the Journal During Protection”, on page 24
■ “What Happens After the VPG is Defined”, on page 25
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Introduction to Protecting Virtual Machines 21
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Introduction to Protecting Virtual Machines
■ Storage: The default storage volume to use for the recovered virtual machine files and for their data volumes. The storage
used for the virtual machine definition is also used for the virtual machine data and can be overridden per virtual machine,
as required. If a cluster is selected for the host, only storage accessible by every host in the cluster is displayed
■ Recovery: Recovery details include the networks to use for recovered virtual machines, such as the virtual networks,
subnets, network security groups, instance families, and instance size to use for failover/move and failover test
procedures, and the scripts, if any, that should run at the start or end of a recovery operation.
■ Backup: The backup properties that govern the VPG backup, including the repository where the backups are saved. Offsite
backup is relevant only when creating VPGs that will be recovered to Azure. When creating VPGs to be recovered from
Azure this tab is not shown.
■ Summary: The details of the VPG configuration defined in the previous components.
For information about protecting VMs created in Azure see “Protecting Virtual Machines From Azure” on page 28.
See also “Azure Limitations Which Affect Installation and Recoverability”, on page 23.
For details of the screen, see “Monitoring a Single VPG”, on page 69.
Recovery
After initializing the VPG, all writes to the protected virtual machines are sent by the VRA on the relevant host for each virtual
machine on the protected site to the VRA. The information is saved in the journal for the virtual machine with a timestamp,
ensuring write-fidelity. Every few seconds the Zerto Virtual Manager writes a checkpoint to every journal on Azure for every
virtual machine in the VPG, ensuring crash-consistency.
The data remains in the journal, in a storage account, for the time defined by the journal history configuration, after which it is
moved to the relevant mirror disks, also in the storage account, for each virtual machine. Both the journal and the mirror disks
are managed by the VRA
When recovering, either a failover or move, or testing failover or cloning protected virtual machines in the recovery site, you
specify the checkpoint to which you want the recovered virtual machines to be recovered. The mirror disks and journal are used
to recover the virtual machines to this point-in-time. When recovering to Azure, the recovered virtual machines are created as
new virtual machines in a dedicated, new, resource group.
Offsite Backups
After initializing the VPG, Zerto Virtual Replication periodically checks that the schedule to run an offsite backup has not been
passed, either a daily or weekly. At the scheduled backup time, the offsite backup is run and the offsite backup file stored in the
specified repository.
Offsite backups are kept on a ZCA configured repository for the retention period specified in the VPG. However, over time the
number of stored offsite backups is reduced to save space.
Offsite backup is relevant only when creating VPGs that will be recovered to Azure. Offsite backup is not supported for VPGs,
created in, and that will be recovered from Azure.
The number of stored offsite backups for daily backups is as follows:
RETENTION PERIOD DAILY WEEKLY MONTHLY NUMBER OF MAXIMUM NUMBER OF
BACKUPS DAYS TO OLDEST BACKUP
1 week 7 0 0 7 7
1 month 7 4 0 11 35
3 months 7 4 2 13 91
6 months 7 4 5 16 175
9 months 7 4 8 19 259
12 months 7 4 11 22 343
That is, an offsite backup is kept for each day for the current week and then the oldest offsite backup for the previous week is
kept for the previous four weeks and then the oldest monthly backup is kept for the rest of the retention period.
The number of stored offsite backups for weekly backups is as follows:
RETENTION PERIOD WEEKLY MONTHLY NUMBER OF MAXIMUM NUMBER OF
BACKUPS DAYS TO OLDEST BACKUP
1 week 1 0 1 7
1 month 4 1 5 58
3 months 4 3 7 121
6 months 4 6 10 205
Virtual Machines created in Azure can be protected to the following original on-premise platforms:
■ VMware vSphere - See Protecting Azure Virtual Machines to a vCenter Server Recovery Site
■ Microsoft Hyper-V - See Protecting Azure Virtual Machines to a Hyper-V Recovery Site
■ vCloud Director (VCD) - See Protecting Azure Virtual Machines to a vCloud Director Recovery Site
Before protecting your virtual machines, review the Requirements for Microsoft Azure Environments
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Protecting Virtual Machines From Azure 28
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Protecting Virtual Machines From Azure
See also “Azure Limitations Which Affect Installation and Recoverability”, on page 29.
■ Both the protected and recovery sites must be running Zerto Virtual Replication version 5.5.
When the protected site is Azure, the following protection is available:
■ “Protecting Azure Virtual Machines to a vCenter Server Recovery Site”, below
■ “Protecting Azure Virtual Machines to a Hyper-V Recovery Site”, on page 44
■ “Protecting Azure Virtual Machines to a vCloud Director Recovery Site”, on page 53
2. Specify the name of the VPG and the priority of the VPG.
VPG Name – The VPG name must be unique. The name cannot be more than 80 characters.
Priority – Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site. When there are updates to virtual machines protected
in VPGs with different priorities, first the updates from the VPG with the highest priority are passed over the WAN.
Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority VPGs have used it. This is
also true between medium and low priorities. Note that updates to the protected virtual machines are always sent across
the WAN before synchronization data, such as during a bitmap or delta sync. During a synchronization, only after updates
to the virtual machines are sent over the WAN, based on the VPG priority, is synchronization data from the VPG sent, and
the synchronization data from the VPG with the highest priority is passed over the WAN before data from medium and
low priority VPGs.
3. Click NEXT.
4. Unprotected VMs with all its disks in the storage account specified during the installation, are included in the list and can
be selected for protection. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these
VMs in the VPG.
The hardware version of the virtual machine must be the same or less than the hardware version supported by the vDC in
vCloud Director (vCD) otherwise recovery of the virtual machine in vCD is not permitted. Set the supported hardware level
in the Provider vDC Properties for the vDC in the vCloud Director console.
The Select VMs dialog is displayed.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
5. If you want to define the boot order of the virtual machines in the VPG, click DEFINE BOOT ORDER, otherwise go to the
next step.
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site field
automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
7. Specify the recovery site.
Recovery Site – The site to which you want to recover the virtual machines. After specifying the recovery site, other fields
are displayed including the host and datastore to use for replication.
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
ZORG – If the site is defined in Zerto Cloud Manager, you specify the name used by the cloud service provider to identify
you as a Zerto Organization, ZORG. For details about Zerto Cloud Manager, refer to Zerto Cloud Manager Administration
Guide.
Host – The default cluster, resource pool or host in the recovery site that handles the replicated data. If the site is defined in
Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have been specified as a
resource in Zerto Cloud Manager.
Note: If Zerto Cloud Manager is used, vSphere Standard edition cannot be used.
For details about Zerto Cloud Manager, refer to Zerto Cloud Manager Administration Guide.
When a resource pool is specified, Zerto Virtual Replication checks that the resource pool capacity is enough for any
virtual machines specified in the VPG.
All resource pool checks are made at the level of the VPG and do not take into account multiple VPGs using the same
resource pool. If the resource pool CPU resources are specified as unlimited, the actual limit is inherited from the parent
but if this inherited value is too small, failover, move, and failover test operations can fail, even without a warning alert
being issued by Zerto Virtual Manager.
Note: If a resource pool is specified and DRS is disabled for the site later on, all the resource pools are removed by VMware
and recovery will be to any one of the hosts in the recovery site with a VRA installed on it.
Datastore – The default datastore to use for recovered virtual machine files and for their data volumes. Every datastore for
the selected recovery host is included in the drop-down list. If a cluster or resource pool is selected for the host, only
datastores that are accessible by every host in the cluster or resource pool are displayed.
8. When the Zerto Cloud Manager is used select the service profile.
Service Profile – The name of the service profile to use which determines the VPG SLA settings for the group, which apply
to every virtual machine in the group. To change the VPG SLA settings, select the Custom Service Profile.
9. If the VPG SLA settings are editable, when the Zerto Cloud Manager is not used or when a Custom service profile is
available, specify these settings for the group, which apply to every virtual machine in the group.
Journal History - The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
You can select the number of hours from 1 to 24 or the number of days from 2 to 30.
Journal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The maximum journal size in GB.
■ The minimum journal size, set by Zerto Virtual Replication, is 8 GB, for Hyper-V and vSphere environments, and
10GB for Microsoft Azure environments.
■ Percentage: The percentage of the virtual machine volume size to which the journal can grow.
■ This value can be configured to more than 100% of the protected VM's volume size.
Journal Size Warning Threshold: The size of the journal that triggers a warning that the journal is nearing its hard limit.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the values of Size and Percentage must be less than the configured Hard Limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
Target RPO Alert – The maximum desired time between each automatic checkpoint write to the journal before an alert is
issued. To increase the value, move the slider right; to decrease the value, move the slider left.
Test Reminder – The time recommended between testing the integrity of the VPG. A warning is issued if a test is not done
within this time frame.
10. If you want to change the replication settings per virtual machine, click VM SETTINGS.
In this dialog, you can edit the values of one or more of the virtual machines in the VPG.
11. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM dialog is displayed.
Recovery Host: The cluster, resource pool, or host that will host the recovered virtual machine. If the site is defined in
Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have been defined in Zerto
Cloud Manager. For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration Guide.
When a resource pool is specified, Zerto Virtual Replication checks that the resource pool capacity is enough for all the
virtual machines specified in the VPG.
If a resource pool is specified and DRS is disabled for the site later on, all the resource pools are removed by VMware and
recovery is to any one of the hosts in the recovery site with a VRA installed on it.
All resource pool checks are made at the level of the VPG and do not take into account multiple VPGs using the same
resource pool. If the resource pool CPU resources are defined as unlimited, the actual limit is inherited from the parent but
if this inherited value is too small, failover, move, and failover test operations can fail, even without a warning alert being
issued by Zerto Virtual Manager.
Recovery Datastore: The datastore where the VMware metadata files for the virtual machine are stored, such as the vmx
file. If a cluster or resource pool is selected for the host, only datastores that are accessible by every ESX/ESXi host in the
cluster or resource pool are displayed. This is also the datastore where RDM backing files for recovery volumes are
located.
Journal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
Thin – If the recovery volumes are thin-provisioned or not.
IMPORTANT: Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in
volume initial synchronization.
Temp Data – If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the recovery
disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial synchronization.
If you want to edit storage information for one of the virtual machines, select the virtual machine and click EDIT SELECTED.
15. Specify the volume source for recovery from one of the following options.
Datastore – A new volume is used for replicated data. Specify the datastore to use to create disks for the replicated data. If
the source disk is thin provisioned, the default for the recovery volume is that it is also thin provisioned.
The datastore specified for replication must have at least the same amount of space as the protected volume and an
additional amount for the journal. The amount of additional space needed for the journal can be fixed by specifying a
maximum size for the journal, or can be calculated as the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
Zerto Virtual Replication supports the SCSI protocol. Only disks that support this protocol can be specified.
Preseeded volume – Whether to copy the protected data to a virtual disk in the recovery site. Zerto recommends using this
option particularly for large disks so that the initial synchronization will be faster since a Delta Sync can be used to
synchronize any changes written to the recovery site after the creation of the preseeded disk. When not using a preseeded
disk, the initial synchronization phase must copy the whole disk over the WAN. When using a preseeded virtual disk, you
select the datastore and exact location, folder, and name of the preseeded disk, which cannot be an IDE disk. Zerto Virtual
Replication takes ownership of the preseeded disk, moving it from its source folder to the folder used by the VRA. Only
disks with the same size as the protected disk can be selected when browsing for a preseeded disk. The datastore where
the preseeded disk is placed is also used as the recovery datastore for the replicated data.
If the preseeded disk is greater than 1TB on NFS storage, the VPG creation might fail. This is a known VMware problem
when the NFS client does not wait for sufficient time for the NFS storage array to initialize the virtual disk after the RPC
parameter of the NFS client times out. The timeout default value is 10 seconds. See the VMware documentation, http://
kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1027919, which
describes the configuration option to tune the RPC timeout parameter using the esxcfg-advcfg -s <Timeout> /NFS/
SetAttrRPCTimeout command.
Datastore – The datastore where the preseeded disk is located.
Path – The full path to the preseeded disk.
Note the following conditions:
■ If the protected disks are non-default geometry, configure the VPG using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a recovery VMDK disk. Zerto Virtual Replication
makes sure that the VMDK disk size is a correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the location of the preseeded disk must be defined in the
Zerto Cloud Manager. For details, see Zerto Cloud Manager Administration Guide.
16. Specify the other volume options.
Temp Data disk – If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the
recovery disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial
synchronization.
Thin provisioning – If the recovery volumes are thin-provisioned or not. If the source disk is thin provisioned, the default for
the recovery volume is that it is also thin provisioned.
19. Select the default recovery settings. These are applied to every virtual machine in the VPG.
Failover/Move Network – The network to use during a failover or move operation in which the recovered virtual machines
will run.
Failover Test Network – The network to use when testing the failover of virtual machines in the recovery site. Zerto
recommends using a fenced-out network so as not to impact the production network at this site.
Recovery Folder – The folder to which the virtual machines are recovered.
20. To specify a recovery folder for each virtual machine in the VPG, click VM SETTINGS.
The Advanced VM Recovery Settings dialog is displayed.
In this dialog, you can edit the values of one or more of the virtual machines in the VPG.
21. If you want to edit information in a field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
26. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED. Otherwise, go to step 29.
27. Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
In each column, specify the following:
Network: The network to use for this virtual machine.
Create New MAC Address: Whether the Media Access Control address (MAC address) used on the protected site should
be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you check this
option, to create a new MAC address, and the current IP address is not specified, the protected virtual machine static IP
address might not be used for the recovered virtual machine.
Change vNIC IP Configuration: Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is only
changed after recovery for virtual machines with VMware Tools running.
Refer to the Zerto Virtual Replication Interoperability Matrix for the list of operating systems for which Zerto supports Re-
IPing.
To change the vNIC IP, select Yes in the Failover/Move or Test column. If you select to use a static IP connection, set the IP
address, subnet mask, and default gateway. Optionally, change the preferred and alternate DNS server IPs and the DNS
suffix. If you leave the DNS server and suffix entries empty, or select to use DHCP, the IP configuration and DNS server
configurations are assigned automatically, to match the protected virtual machine. You can change the DNS suffix.
If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each octet in
the Default gateway field for the NICs with no default gateway.
During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP, after
the virtual machine has started it is automatically rebooted so that it starts up with the correct IP. If the same network is
used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started for
the test, so that there is no IP clash between the test machines and the production machines.
Copy to failover test – Copies the settings in the Failover/Move column to the Test column.
Copy to failover/move – Copies the settings in the Test column to the Failover/Move column.
28. Click OK.
29. Click NEXT.
The SUMMARY step is displayed. It shows the VPG configuration that you defined in previous tabs.
2. Specify the name of the VPG and the priority of the VPG.
VPG Name – The VPG name must be unique. The name cannot be more than 80 characters.
Priority – Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site. When there are updates to virtual machines protected
in VPGs with different priorities, first the updates from the VPG with the highest priority are passed over the WAN.
Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority VPGs have used it. This is
also true between medium and low priorities. Note that updates to the protected virtual machines are always sent across
the WAN before synchronization data, such as during a bitmap or delta sync. During a synchronization, only after updates
to the virtual machines are sent over the WAN, based on the VPG priority, is synchronization data from the VPG sent, and
the synchronization data from the VPG with the highest priority is passed over the WAN before data from medium and
low priority VPGs.
3. Click NEXT.
4. Unprotected VMs with all its disks in the storage account specified during installation, are included in the list and can be
selected for protection. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these VMs
in the VPG.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
5. If you want to define the boot order of the virtual machines in the VPG, click DEFINE BOOT ORDER, otherwise go to the
next step.
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
Note: If the protected site is paired with only one recovery site, the recovery step is displayed with the Recovery Site
field automatically filled in and defaults set for the SLA and Advanced settings, as shown below.
7. Specify the recovery site and default values to use for the replication to this site.
Recovery Site – The site to which you want to recover the virtual machines. After specifying the Microsoft SCVMM
recovery site, the host and storage on the site to use for the replication can be specified.
CreateVPG_4_replication_HV
Note: You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that
site.
Host – The default cluster or host, in the recovery site that handles the replicated data.
Storage – The default storage volume to use for the recovered virtual machine files and for their data volumes. Every
storage for the recovery host is included in the drop-down list. If a cluster is selected for the host, only storage accessible
by every host in the cluster are displayed.
8. Optionally, change the VPG SLA settings, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
You can select the number of hours from 1 to 24 or the number of days from 2 to 30.
For additional journal-related fields, click ADVANCED.
The Advanced Journal Settings dialog is displayed.
Journal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The maximum journal size in GB.
■ The minimum journal size, set by Zerto Virtual Replication, is 8 GB, for Hyper-V and vSphere environments, and
10GB for Microsoft Azure environments.
■ Percentage: The percentage of the virtual machine volume size to which the journal can grow.
■ This value can be configured to more than 100% of the protected VM's volume size.
Journal Size Warning Threshold: The size of the journal that triggers a warning that the journal is nearing its hard limit.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the values of Size and Percentage must be less than the configured Hard Limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
Target RPO Alert – The maximum desired time between each automatic checkpoint write to the journal before an alert is
issued. To increase the value, move the slider right; to decrease the value, move the slider left.
Test Reminder – The time recommended between testing the integrity of the VPG. A warning is issued if a test is not done
within this time frame.
9. If you want to change the replication settings per virtual machine, click VM SETTINGS.
In this dialog, you can edit the values of one or more of the virtual machines in the VPG.
10. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM dialog is displayed.
Recovery Host: The cluster, resource pool, or host that will host the recovered virtual machine. If the site is defined in
Zerto Cloud Manager, only a resource pool can be specified and the resource pool must also have been defined in Zerto
Cloud Manager. For details about Zerto Cloud Manager, see Zerto Cloud Manager Administration Guide.
When a resource pool is specified, Zerto Virtual Replication checks that the resource pool capacity is enough for all the
virtual machines specified in the VPG.
Recovery Storage: The location where the metadata files for the virtual machine are stored, such as the vhdx file. If a
cluster is selected for the host, only storage that are accessible by every host in the cluster are displayed.
Journal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The maximum journal size in GB.
■ The minimum journal size, set by Zerto Virtual Replication, is 8 GB, for Hyper-V and vSphere environments, and
10GB for Microsoft Azure environments.
■ Percentage: The percentage of the virtual machine volume size to which the journal can grow.
■ This value can be configured to more than 100% of the protected VM's volume size.
Journal Size Warning Threshold: The size of the journal that triggers a warning that the journal is nearing its hard limit.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the values of Size and Percentage must be less than the configured Hard Limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
Journal Storage: The storage used for the journal data for each virtual machine in the VPG. To change the default, specify
a host and then select the storage location accessible by this host to be used as the journal storage. When you select
specific journal storage, the journals for each virtual machine in the VPG are stored in this storage, regardless of where the
recovery storage is for each virtual machine. In this case, all the protected virtual machines must be recovered to hosts that
can access the specified journal storage.
Click OK.
11. In the Advanced VM Replication Settings dialog, click OK.
12. Click NEXT.
The STORAGE step is displayed. By default the storage used for the virtual machine definition is also used for the virtual
machine data. For each virtual machine in the VPG, Zerto Virtual Replication displays its storage-related information.
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
Temp Data – If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the recovery
disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial synchronization.
13. If you want to edit storage information for one of the virtual machines, select the machine and click EDIT SELECTED.
The Edit Volumes dialog is displayed.
14. Specify the volume source for recovery from one of the options.
Storage – A new volume is used for replicated data. Specify the storage to use to create disks for the replicated data.
The storage specified for the replication must have at least the same amount of space as the protected volume and then an
additional amount for the journal. The amount of additional space needed for the journal can be fixed by specifying a
maximum size for the journal, or can be calculated as the average change rate for the virtual machines in the VPG,
multiplied by the length of time specified for the journal history.
Preseeded volume – Whether to copy the protected data to a virtual disk in the recovery site. Zerto recommends using this
option particularly for large disks so that the initial synchronization will be faster since a Delta Sync can be used to
synchronize any changes written to the recovery site after the creation of the preseeded disk. When not using a preseeded
disk, the initial synchronization phase must copy the whole disk over the WAN. When using a preseeded virtual disk, you
select the storage and exact location, folder, and name of the preseeded disk. Zerto Virtual Replication takes ownership of
the preseeded disk, moving it from its source folder to the folder used by the VRA. Only disks with the same size as the
protected disk can be selected when browsing for a preseeded disk. The storage where the preseeded disk is placed is also
used as the recovery storage for the replicated data.
15. Specify the other volume options.
Temp Data disk – If the virtual machine to be replicated includes a temp data disk as part of its configuration, specify a
mirror disk for replication that is marked as a temp data disk. In this case, data is not replicated to the temp data disk after
initial synchronization.
16. Click OK.
17. Click NEXT.
The RECOVERY step is displayed. Recovery details include the networks to use for failover, move, and for testing failover,
and whether scripts should run as part of the recovery operation.
21. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED. Otherwise, go to step 24.
The Edit VNIC dialog is displayed.
22. Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
In each column, specify the following:
Network: The network to use for this virtual machine.
Create New MAC Address: Whether the Media Access Control address (MAC address) used on the protected site should
be replicated on the recovery site. The default is to use the same MAC address on both sites. Note that if you check this
option, to create a new MAC address, and the current IP address is not specified, the protected virtual machine static IP
address might not be used for the recovered virtual machine.
Change vNIC IP Configuration: Whether or not to keep the default virtual NIC (vNIC) IP configuration. Configuration is
possible only when the guest operating system is defined in the hypervisor manager and Integration Services or VMware
Tools are detected. The vNIC IP address is only changed after recovery for virtual machines with VMware Tools and
Microsoft Integration Services running.
Note: VMware Tools must also be installed on the virtual machine in vCenter server, so that a failback can utilize Re-IPing.
Refer to the Zerto Virtual Replication Interoperability Matrix for the list of operating systems for which Zerto supports Re-
To change the vNIC IP configuration, select Yes in the Failover/Move or Test column. If you select to use a statically-
assigned IP address, set the IP address, subnet mask, and default gateway. Optionally, change the preferred and alternate
DNS server IP addresses and the DNS suffix. If you leave the DNS server and suffix entries empty, or select to use DHCP,
the IP address and DNS server configurations are assigned automatically, to match the protected virtual machine. You can
change the DNS suffix.
If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each octet in
the Default gateway field for the NICs with no default gateway.
Note: During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP address than the
original IP address, after the virtual machine has started it is injected with the correct IP address. If the same network is
used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started for
the test, so that there is no IP address clash between the test machines and the production machines.
Copy to failover test – Copies the settings in the Failover/Move column to the Test column.
Copy to failover/move – Copies the settings in the Test column to the Failover/Move column.
23. Click OK.
24. Click NEXT.
The SUMMARY step is displayed. It shows the VPG configuration that you defined in previous tabs.
2. Specify the name of the VPG and the priority of the VPG.
VPG Name – The VPG name must be unique. The name cannot be more than 80 characters.
Priority – Determine the priority for transferring data from the protected site to the recovery site when there is limited
bandwidth and more than one VPG is defined on the protected site. When there are updates to virtual machines protected
in VPGs with different priorities, first the updates from the VPG with the highest priority are passed over the WAN.
Medium priority VPGs will only be able to use whatever bandwidth is left after the high priority VPGs have used it. This is
also true between medium and low priorities. Note that updates to the protected virtual machines are always sent across
the WAN before synchronization data, such as during a bitmap or delta sync. During a synchronization, only after updates
to the virtual machines are sent over the WAN, based on the VPG priority, is synchronization data from the VPG sent, and
the synchronization data from the VPG with the highest priority is passed over the WAN before data from medium and
low priority VPGs.
3. Click NEXT.
Note: If vCloud Director is also on the protected site, choose vCenter. For details of protecting from vCD, refer to.
4. Unprotected VMs with all its disk in the storage account specified during installation, are included in the list and can be
selected for protection. Select the VMs that will be part of this VPG and click the right-pointing arrow to include these VMs
in the VPG.
The hardware version of the virtual machine must be the same or less than the hardware version supported by the vDC in
vCloud Director (vCD) otherwise recovery of the virtual machine in vCD is not permitted. Set the supported hardware level
in the Provider vDC Properties for the vDC in the vCloud Director console.
The Select VMs dialog is displayed.
Note: Virtual machines can be protected in a maximum of three VPGs. These VPGs cannot be recovered to the same site.
Virtual machines protected in the maximum number of VPGs are not displayed in the Select VMs dialog.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
Note: You define the boot order for the recovered vCD vApp in the vCloud Director console.
5. If you want to define the boot order of the virtual machines in the VPG, click DEFINE BOOT ORDER, otherwise go to the
next step.
When virtual machines in a VPG are started in the recovery site, by default these machines are not started up in a
particular order. If you want specific virtual machines to start before other machines, you can specify a boot order. The
virtual machines are defined in groups and the boot order applies to the groups and not to individual virtual machines in the
groups. You can specify a delay between groups during startup.
Note: Up to five virtual machines may boot on a host simultaneously. Following the boot, a 300 second (default) delay
occurs until the next boot batch.
Initially, virtual machines in the VPG are displayed together under the Default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
The REPLICATION step is re-displayed, with additional fields that are relevant for VC or vCD. If you chose vCD, this screen
is displayed.
When VCD is selected, specify the Recovery Org vDC to use in the recovery site.
ZORG – If the site is defined in Zerto Cloud Manager, you specify the name used by the cloud service provider to identify
you as a Zerto Organization, ZORG. For details about Zerto Cloud Manager, refer to Zerto Cloud Manager Administration
Guide
You cannot select a recovery site if any of the virtual machines you selected are already in VPGs that recover to that site.
9. When the Zerto Cloud Manager is used select the service profile.
Service Profile – The name of the service profile to use which determines the VPG SLA settings for the group, which apply
to every virtual machine in the group. To change the VPG SLA settings, select the Custom Service Profile.
10. If the VPG SLA settings are editable, when the Zerto Cloud Manager is not used or when a Custom service profile is
available, specify these settings for the group, which apply to every virtual machine in the group.
■ Journal History: The time that all write commands are saved in the journal.
The longer the information is saved in the journal, the more space is required for each journal in the VPG.
You can select the number of hours from 1 to 24 or the number of days from 2 to 30.
For additional journal-related fields, click ADVANCED.
The Advanced Journal Settings dialog is displayed.
JJournal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The maximum journal size in GB.
■ The minimum journal size, set by Zerto Virtual Replication, is 8 GB, for Hyper-V and vSphere environments, and
10GB for Microsoft Azure environments.
■ Percentage: The percentage of the virtual machine volume size to which the journal can grow.
■ This value can be configured to more than 100% of the protected VM's volume size.
Journal Size Warning Threshold: The size of the journal that triggers a warning that the journal is nearing its hard limit.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the values of Size and Percentage must be less than the configured Hard Limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
Target RPO Alert: The maximum desired time between each automatic checkpoint write to the journal before an alert is
issued. To increase the value, move the slider right; to decrease the value, move the slider left.
Test Reminder: The time recommended between testing the integrity of the VPG. A warning is issued if a test is not done
within this time frame.
11. If you want to change the replication settings per virtual machine, click VM SETTINGS.
The Advanced VM Replication Settings dialog is displayed.
In this dialog, you can edit the values of one or more of the virtual machines in the VPG.
12. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED.
The Edit VM dialog is displayed.
Storage Profile – Storage profiles enable mapping virtual machines to storage levels according to predefined service levels,
storage availability, performance requirements or cost. You can define and label storage tiers and then specify the tier to
use as a storage profile, for each virtual machine in the VPG. The default storage profile is the default for the Recovery Org
vDC.
Zerto will place all the volumes of each virtual machine in a datastore, according to the following considerations:
■ The datastore is part of the selected storage profile.
■ The datastore is configured as recovery datastore target in the Configure PVDC dialog.
■ The datastore has enough space to contain all of the virtual machine volumes.
If Zerto Virtual Replication cannot find a storage profile that can be used as target storage, the value is set to Zerto_Any.
In this case, any of the datastores configured in the Configure Provider vDCs dialog can be selected as recovery datastores,
provided they are exposed to the relevant recovery hosts. Upon recovery, Zerto Virtual Replication chooses a storage
profile available to the Org vDC, for the recovered vApp, that contains all of the datastores on which recovery volumes of
the VPG reside. If there is no such storage profile, the recovery operation cannot start. The storage profile can be set to
Zerto_Any for a number of reasons, such as adding a virtual machine to the VPG which does not have a storage profile
that can be used as the target.
Journal Size Hard Limit: The maximum size that the journal can grow, either as a percentage or a fixed amount.
The journal is always thin-provisioned.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The maximum journal size in GB.
■ The minimum journal size, set by Zerto Virtual Replication, is 8 GB, for Hyper-V and vSphere environments, and
10GB for Microsoft Azure environments.
■ Percentage: The percentage of the virtual machine volume size to which the journal can grow.
■ This value can be configured to more than 100% of the protected VM's volume size.
Journal Size Warning Threshold: The size of the journal that triggers a warning that the journal is nearing its hard limit.
■ Unlimited: The size of the journal is unlimited and it can grow to the size of the recovery datastore.
Note: If Unlimited is selected, the Size and Percentage options are not displayed.
■ Size (GB): The size in GB that will generate a warning.
■ Percentage: The percentage of the virtual machine volume size that will generate a warning.
Both the values of Size and Percentage must be less than the configured Hard Limit so that the warning will be generated
when needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space
available for the journal is almost full.
13. Click OK.
14. In the Advanced VM Replication Settings dialog, click OK.
15. Click NEXT.
The STORAGE step is displayed. By default the storage used for the virtual machine definition is also used for the virtual
machine data. For each virtual machine in the VPG, Zerto Virtual Replication displays its storage-related information.
Note: Steps that do not require input are marked with a check mark. You can jump directly to a step that has been marked
with a check mark to edit the values for that step. Every step must be marked with a check mark before you can click DONE
to create the VPG.
Thin – If the recovery volumes are thin-provisioned or not.
IMPORTANT: Changing the VPG recovery volume from thin-provisioned to thick-provisioned or vice versa, results in
volume initial synchronization.
Temp Data – If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the recovery
disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial synchronization.
16. If you want to edit storage information for one of the virtual machines, select the machine and click EDIT SELECTED.
The Edit Volumes dialog is displayed.
17. Specify the volume source for recovery from one of the options.
vCD managed storage profile – The datastore is allocated based on the available free space. You can specify whether the
recovery volume is thin-provisioned or not. If the Org vDC only supports thin-provisioned volumes, you cannot change the
setting.
Preseeded volume – A virtual disk (the VMDK flat file and descriptor) in the recovery site that has been prepared with a
copy of the protected data. Zerto recommends using this option particularly for large disks so that the initial
synchronization is much faster since a Delta Sync is used to synchronize any changes written to the recovery site after the
creation of the preseeded disk. When not using a preseeded disk the initial synchronization phase has to copy the whole
disk over the WAN. Browse to the preseed folder configured for the customer and the disk name, of the preseeded disk. In
order to use a preseeded VMDK, do the following:
■ Create a folder in vCD to use for the preseeded disks in the datastore you want to use for the customer.
■ Specify this datastore as a provider datastore for preseeded disks in the Configure Provider vDCs dialog, from the
Advanced Settings dialog, as described in Zerto Cloud Manager Administration Guide.
■ In the Zerto Cloud Manager specify the Preseed Folder Name for the ZORG, in the Manage ZORG tab.
Zerto Virtual Replication searches for the preseeded folder in the available datastores in the Org vDCs specified in the vCD
Cloud Resources for the ZORG in the Zerto Cloud Manager and takes ownership of the preseeded disk, moving it from its
source folder to the folder used by the VRA. Note that if the virtual machine has more than one preseeded disk, these disks
must reside on the same datastore. If the preseeded disk is greater than 1TB on NFS storage, the VPG creation might fail.
This is a known VMware problem when the NFS client does not wait for sufficient time for the NFS storage array to
initialize the virtual disk after the RPC parameter of the NFS client times out. The timeout default value is 10 seconds. Refer
to the VMware documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919, which describes the configuration option to tune the
RPC timeout parameter using the esxcfg-advcfg -s <Timeout> /NFS/SetAttrRPCTimeout command.
If the VPG is being defined for a Zerto Organization, ZORG, the location of the preseeded disk must be defined in the Zerto
Cloud Manager. For details, refer to Zerto Cloud Manager Administration Guide.
Zerto Virtual Replication supports the SCSI protocol. Only disks that support this protocol can be specified. Virtual
machine RDMs in a vCenter Server are replicated as VMDKs in a vCD environment.
18. Specify the other volume options.
Temp Data disk – If the virtual machine to be replicated includes a temp data disk as part of its configuration, mark the
recovery disk for this disk as a temp data disk. In this case, data is not replicated to the temp data disk after initial
synchronization.
Thin provisioning – If the recovery volumes are thin-provisioned or not.
19. Click OK.
20. Click NEXT.
The RECOVERY step is displayed. Recovery details include the scripts that should be run either at the start or end of a
recovery operation.
The NICs step is displayed. In this step, you can specify the NIC details to use for the recovered virtual machines after a
failover, a test failover, or migration.
24. If you want to edit information in one field, click the field and update the information. If you want to edit information for
several virtual machines at the same time, select the virtual machines and click EDIT SELECTED. Otherwise, go to step 26.
The Edit VNIC dialog is displayed.
25. Specify the network details to use for the recovered virtual machines after a failover or move operation, in the Failover/
Move column, and for the recovered virtual machines when testing replication, in the Test column.
In each column, specify the following:
Network: The network to use for this virtual machine.
MAC Address – Whether the Media Access Control address (MAC address) used on the protected site should be
replicated on the recovery site. The default is to use the same MAC address on both sites.
vNIC IP Mode – Which IP mode to use. Specify the IP address if you choose static IP pool.
Refer to the Zerto Virtual Replication Interoperability Matrix for the list of operating systems for which Zerto supports Re-
IPing.
Note: During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
after the virtual machine has started it is automatically rebooted so that it starts up with the correct IP. If the same network
is used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started
for the test, so that there is no IP clash between the test machines and the production machines.
Copy to failover test – Copies the settings in the Failover/Move column to the Test column.
Copy to failover/move – Copies the settings in the Test column to the Failover/Move column.
26. Click OK.
You can monitor information about all the VPGs either protected at the local site or recovered to the local site in the VPGs tab.
You can also drill-down to monitor information about a specific VPG displayed in the VPGs tab or about the virtual machines
being protected by VPGs. You can also view summary details of the protected and recovery sites in either the protected or
recovery site as well as monitor the status of each virtual protection group and any of the virtual machines being protected in
either site.
The following general monitoring options are described in this section:
■ “The DASHBOARD Tab”, below
■ “Monitoring VPGs – The VPGs Tab”, on page 65
■ “Monitoring a Single VPG”, on page 69
■ “Monitoring Tasks”, on page 72
■ “Monitoring Protected Virtual Machines – The VMs Tab”, on page 74
The following site monitoring option is described in this section:
■ “Monitoring Sites”, on page 76
The following offsite backup monitoring options are described in this section:
■ “Monitoring Repositories for Offsite Backups – The SETUP Tab”, on page 77
■ “Monitoring Offsite Backups – The OFFSITE BACKUP Tab”, on page 78
For details about monitoring Zerto Virtual Manager alerts and events, refer to Zerto Virtual Replication Guide to Alarms, Alerts
and Events.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Monitoring Zerto Virtual Replication 63
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Monitoring Zerto Virtual Replication
VPG HEALTH
The VPGs being protected to or recovered from Azure, along with the health of each VPG, are represented by colored blocks,
where the color represents the following:
Green – The VPG is being replicated, including syncing the VPG between the sites.
Orange – The VPG is being replicated but there are problems, such as an RPO value larger than the target RPO value
specified for the VPG.
Red – The VPG is not being replicated, for example because communication with Azure is down.
Positioning the mouse over a block displays the VPG name as a tooltip. Clicking the block opens the details tab for the VPG.
STATUS
The status of the site, including the following:
■ The number of VPGs and virtual machines being protected or recovered.
■ The amount of storage being protected.
■ The average RPO.
■ The percentage compression of data passed between the site and peer sites.
Performance Graphs
The current site performance, which includes the following information:
IOPS (IO per second) – The IO between all the applications running on the virtual machines being protected and the VRA that
sends a copy to the remote site for replication.
Throughput (MB/sec): The MBs for all the applications running on the virtual machines being protected. There can be a high
IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the
IOPS and Throughput values together provide a more accurate indication of performance.
WAN Traffic (MB/sec): The VPG related outgoing traffic between the sites.
A listing of the currently active alerts and running tasks, and the events run during the last few hours.
User input, for example, stopping a failover test or committing or rolling back a Move or Failover operation, can be initiated
from the relevant task displayed in the RUNNING TASKS section.
You can create a query using the view buttons ( )to display VPG information in a list or as a grid. In both list and grid
views you can filter the VPGs that will be displayed according to their status by checking the checkboxes alongside the VPG
status icons ( ). The query can be customized by adding and removing filters.
The QUERY option allows you to save or run a personal query, or set the VPG tab back to its default view.
VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about
the VPG that are displayed in a dynamic tab. The number of VMs protected in the VPG is displayed in parentheses.
Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
Peer Site: The name of the site with which this site is paired: the site where the VPG is protected or will be recovered to.
Priority: The priority of the VPG.
Protection Status: The current status of the VPG, such as Meeting SLA. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation
completed, such as syncing, is displayed.
Actual RPO: The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert value
specified for the VPG.
Operation: The operation, such as Move, that is currently being performed.
Orange – The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
Red – The VPG is not being replicated, for example, because communication with the remote site is down.
Move the cursor over the Alert status indicator to display details of the alert.
VPG Name (#VMs) – The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details
about the VPG that are displayed in a dynamic tab. The number of virtual machines protected in the VPG is displayed in
parentheses.
IO – The IO per second between all the applications running on the virtual machines in the VPG and the VRA that sends a copy
to the remote site for replication.
Throughput – The MB per second for all the applications running on the virtual machines being protected. There can be a high
IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the
IOPS and Throughput values together provide a more accurate indication of performance.
Network – The amount of WAN traffic.
Provisioned Storage (not shown by default) – The provisioned storage for all the virtual machines in the VPG. Thus, a virtual
machine with 1GB hard disk and 4GB memory will show 5GB provisioned storage.
Used Storage – The storage used by all of the virtual machines in the VPG.
VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about
the VPG that are displayed in a dynamic tab.
Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to 30
days before the disaster, or protection is extended to include offsite backups of the virtual machines, going back for a maximum
of one year.
Backup Status: The status of the backup.
Backup Repository: The name of the repository where the jobs are stored.
Restore Point Range: The restore points for the backup jobs out of the total backup jobs run for the VPG.
Backup Scheduling: The schedule for offsite backups.
Grid View
In the grid view each VPG is displayed as a card.
The default view is of all the VPG cards, un-grouped and sorted by VPG name.
The cards displayed can be filtered by clicking the filter button( ). The default filters are Direction and Protection Status. You
can click the ADD button to open the filters drop-down, and select additional filters. Active filters are displayed with a yellow
background.
Each card contains the following:
Alert status indicator: The color indicates the status of the VPG. Hovering over the alert displays a popup of all active alerts
with descriptions:
Green:The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert value
specified for the VPG.
Red: The VPG is not being replicated, for example, because communication with the remote site is down.
Move the cursor over the Alert status indicator to display details of the alert.
VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about
the VPG that are displayed in a dynamic tab. The number of VMs protected in the VPG is displayed in parentheses.
Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
Peer Site: The name of the site with which this site is paired: the site where the VPG is protected or will be recovered to.
State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation completed,
such as syncing, is displayed.
Actual RPO: The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert
value specified for the VPG.
Operation: The operation, such as Move, that is currently being performed.
You can save details of every VPG displayed in the VPGs tab to a CSV file, which can be opened using programs such as
Microsoft Excel.
In the VPGs tab, click EXPORT and specify where to save the VPG details.
General Tab
The tab on the left side shows the status of the VPG. The following information is displayed in this tab:
Performance Graphs
The current VPG performance, which includes the following information:
RPO (sec): The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert
value specified for the VPG.
IOPS: The IO per second between all the applications running on the virtual machines in the VPG and the VRA that sends a
copy to the remote site for replication.
Throughput (MB/sec): The MB per second for all the applications running on the virtual machines being protected. There can
be a high IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus,
both the IOPS and Throughput values together provide a more accurate indication of performance.
WAN TRAFFIC (MB/sec): The outgoing traffic between the sites.
JOURNAL HISTORY
The journal history shows:
■ The SLA defined for the VPG.
■ The amount of time currently covered by information in the journal.
■ The earliest—oldest—checkpoint currently in the journal that can be used for a recovery operation.
OFFSITE BACKUP
If backup is enabled, the following backup details are displayed:
Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to 30
days before the disaster, or protection is extended to include offsite backups of the virtual machines, going back for a maximum
of one year.
Backup Status: The status of the backup.
Backup Repository: The name of the repository where the jobs are stored.
Restore Point Range: The restore points for the backup jobs out of the total backup jobs run for the VPG.
Backup Scheduling: The schedule for offsite backups.
The PROTECTED VMs tab shows details about the protected virtual machines. This includes:
■ The name of the virtual machine.
■ The boot order group to which the virtual machine belongs.
SITES Tab
The SITES tab shows the topology of the VPG, including both the protected and recovery sites.
SETTINGS Tab
The SETTINGS tab shows details about the VPG settings, divided into general, replication, recovery, and backup categories.
Monitoring Tasks
Recent tasks can also be reviewed for a site by clicking the TASKS area in the status bar at the bottom of the user interface.
Monitoring Tasks 72
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Monitoring Zerto Virtual Replication
The full details of the tasks can be monitored in the TASKS subtab under the MONITORING tab.
Monitoring Tasks 73
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Monitoring Zerto Virtual Replication
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
Alert status indicator: The color indicates the status of the VPG:
Green: The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
Red: The VPG is not being replicated, for example, because communication with the remote site is down.
VM Name: The name of the virtual machine. The name is a link.
VPG Name: The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about the VPG
that are displayed in a dynamic tab.
Direction: The direction of the replication, from this site to the remote site or from the remote site to this site.
Peer Site: The name of the site with which this site is paired: the site where the VPG is protected or will be recovered to.
Priority: The priority of the VPG.
Protection Status: The current status of the virtual machine, such as Meeting SLA. Where appropriate, the percentage of the
operation completed, such as syncing, is displayed.
State: The current substatus of the VPG, such as Delta syncing. Where appropriate, the percentage of the operation completed,
such as syncing, is displayed.
Actual RPO: The time since the last checkpoint was written to the journal. This should be less than the Target RPO Alert value
specified for the VPG.
Operation: The operation, such as Move, that is currently being performed.
PERFORMANCE View
The following information is displayed in the PERFORMANCE view:
Alert status indicator – The color indicates the status of the VPG:
Green – The VPG is being replicated, including syncing the VPG between the sites.
Orange – The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert
value specified for the VPG.
Red – The VPG is not being replicated, for example, because communication with the remote site is down.
VM Name – The name of the virtual machine. The name is a link.
VPG Name – The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about the VPG
that are displayed in a dynamic tab.
IO – The IO per second between all the applications running on the virtual machine and the VRA that sends a copy to Azure.
Throughput: The MB per second for all the applications running on the virtual machines being protected. There can be a high
IO rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the
IOPS and Throughput values together provide a more accurate indication of performance.
Network: The amount of WAN traffic.
Provisioned Storage – The provisioned storage for the virtual machine in the recovery site. Thus, a virtual machine with 1GB
hard disk and 4GB memory will show 5GB provisioned storage.
Used Storage – The storage used by the virtual machine in the recovery site.
BACKUP View
The following information is displayed in the BACKUP view:
Alert status indicator: The color indicates the status of the VPG. Hovering over the alert displays a popup of all active alerts
with descriptions:
Green: The VPG is being replicated, including syncing the VPG between the sites.
Orange: The VPG is being replicated but there are problems, such as an RPO value larger than the Target RPO Alert value
specified for the VPG.
Red: The VPG is not being replicated, for example, because communication with the remote site is down.
Move the cursor over the Alert status indicator to display details of the alert.
VPG Name (#VMs): The name of the VPG. The name is a link: Click the VPG name to drill-down to more specific details about
the VPG that are displayed in a dynamic tab.
Retention Policy: Whether the VPG is protected against a disaster only with the ability to recover to a point in time up to 30
days before the disaster, or protection is extended to include offsite backups of the virtual machines, going back for a maximum
of one year.
Backup Status: The status of the backup.
Backup Repository: The name of the repository where the jobs are stored.
Restore Point Range: The restore points for the backup jobs out of the total backup jobs run for the VPG.
Backup Scheduling: The schedule for offsite backups.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Protected Site – The name of the protected site.
Recovery Site – The name of the recovery site.
ZORG – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
Last Test – The time and date of the last backup performed by Zerto Virtual Manager.
Monitoring Sites
You can display information about the peer sites of the local site via the SITES tab.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
Alert status indicator – The color indicates the alert status of the site:
Green – The Zerto Virtual Manager for the site is running without problems.
Orange – The Zerto Virtual Manager for the site has a problem that does not stop the protection of virtual machines, such
as an RPO value larger than the Target RPO Alert value for a VPG.
Red – The Zerto Virtual Manager for the site is not running correctly, for example, because communication with the site is
down.
Site Name – The name specified for the paired site during installation or in the Site Settings dialog.
Location – The location specified for the paired site during installation or in the Site Settings dialog.
Site IP – The IP of the peer site.
Network – The amount of WAN traffic.
Monitoring Sites 76
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Monitoring Zerto Virtual Replication
IOPS – The IO per second between all the applications running on the virtual machine in the VPG and the VRA that sends a
copy to the remote site for replication.
Incoming Throughput – The MBs for all the applications running on the virtual machine being protected. There can be a high IO
rate with lots of small writes resulting in a small throughput as well as a small IO with a large throughput. Thus, both the IO and
Incoming Throughput values together provide a more accurate indication of performance.
Provisioned Storage (GB) – The maximum storage that can be protected.
# VPGs – The total number of VPGs being protected by the site and replicated to the site.
# VMs – The total number of virtual machines being protected by the site and replicated to the site.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Used Storage (GB) – The name of the protected site.
ZORG – A name given to the organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
Version – The Zerto Virtual Replication version installed at this site.
GENERAL View
In this view, the number of repositories is displayed in the REPOSITORIES tab. The following information is displayed in this
view:
Delete Repository – Links to edit or delete a repository.
Repository Name – The name of the repository.
Repository Type – The type of repository. The options are Local or Network Share (SMB).
Connectivity – Whether the repository is connected or not.
Path – The path to the repository.
Capacity – The overall capacity of the repository.
Free Space – The amount of free space currently available for the repository.
Active Backups – The number of backup jobs currently active that are stored in the repository.
Restore Points – The restore points for the backup jobs out of the total backup jobs saved to the repository.
Compression – A value in this field denotes that the backups stored in the repository are compressed.
Click NEW REPOSITORY to display the New Repository dialog used to create a new repository.
VPGs Tab
View details of the offsite backup jobs by VPG.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
VPG Name: The name of the VPG.
Backup Site: The site where the VPG is backed up. The backup jobs are stored either locally at this site or on a network shared
drive which is accessible from this site.
Status: The status of the job: Running or Scheduled.
Repository Name: The name of the repository where the job is stored.
VPG Size: The size of the VPG in the last run stored on disk.
Result of Last Run: The result of the last run: Full success, Partial success, or Failed.
Restore Points: The restore points for the backup jobs out of the total backup jobs run for the VPG.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Protected Site – The name of the site.
Last Backup Size – The size of the last backup performed by Zerto Virtual Manager.
ZORG – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
# VMs – The total number of virtual machines protected by the VPG.
# of Volumes – The number of volumes protected by the VPG.
VMs Tab
View details of the offsite backup jobs by virtual machine.
You can filter information in columns via the filter icon next to each column title. You can also sort the list by each column.
GENERAL View
The following information is displayed in the GENERAL view:
VM Name – The name of the virtual machine.
VPG Name – The name of the VPG.
Protected Site – The name of the site where the VPG is protected.
Backup Site – The site where the virtual machines are backed up. The backup jobs are stored either locally at this site or on a
network shared drive which is accessible from this site.
Status – The status of the job.
Repository Name – The name of the repository where the job is stored.
VM Size – The size of the VMs stored on disk.
Result of Last Run – The result of the last run: Full success, Partial success, or Failed.
Restore Points – The restore points for the backup jobs out of the total backup jobs run for the VPG.
MORE Options
Click MORE > Edit to edit the backup parameters of the VPG.
Click MORE > Abort Backup to abort a running job. Any virtual machine volumes already stored in the repository are not
removed and the job status is partial if there are any stored volumes.
Click MORE > Run Backup to start a job for a selected VPG, outside of the schedule for that VPG.
Click EXPORT to export the backup list as a Microsoft Excel worksheet.
Additional Fields
There are additional fields that you can display that are listed when you select Show/Hide Columns from the dropdown list
shown by clicking the configuration icon ( ):
Last Backup Size – The size of the last backup performed by Zerto Virtual Manager.
ZORG – A name given to an organization by a cloud service provider. For details refer to Zerto Cloud Manager Administration
Guide.
# of Volumes – The number of volumes associated with the VM.
After defining virtual protection groups (VPGs) the virtual machines specified as part of each VPG are protected. There are a
number of ongoing management tasks that you can perform on a VPG, such as specifying a checkpoint to enable recovery to
that specific point or you can modify the configurations of existing VPGs.
The following VPG management options are described in this section:
■ “Editing a VPG”, below
■ “Adding Virtual Machines to a VPG”, on page 82
■ “Removing Virtual Machines from a VPG”, on page 84
■ “Removing a Protected Virtual Machine from Azure”, on page 84
■ “Modifying Protected Virtual Machine Disks”, on page 82
■ “Pausing and Resuming the Protection of a VPG”, on page 84
■ “Pausing and Resuming the Protection of a VPG”, on page 84
■ “Forcing the Synchronization of a VPG”, on page 85
■ “Deleting a VPG”, on page 85
■ “Running an Unscheduled Offsite Backup”, on page 86
■ “Ensuring Application Consistency – Checkpoints”, on page 86
■ “Running Scripts Before or After Recovering a VPG”, on page 94
■ “Exporting and Importing VPG Definitions”, on page 97
■ “VPG Statuses and Synchronization Triggers”, on page 98
Monitoring VPGs and the VMs that are protected is described in “Monitoring Zerto Virtual Replication”, on page 63.
Editing a VPG
You can edit a VPG definition, including adding virtual machines to the VPG, as described in “Modifying Protected Virtual
Machine Disks”, on page 82, deleting virtual machines from the VPG, or changing the information about how virtual machines
are recovered, such as adding or removing disks from the virtual machine.
Note: You cannot edit the VPG while a backup job is running.
After modifying the VPG, the definition is updated.
While the VPG definition is being updated, you cannot perform any operations on the VPG, such as adding a checkpoint,
editing the VPG properties, or failing the VPG.
After the definition is updated, the VPG is synchronized with the recovery site.
To modify a VPG:
1. In the VPGs tab in the Zerto User Interface, select the VPG to be edited and click MORE > Edit VPG. You can also select the
VPG, display the VPG details, and click EDIT VPG.
The Edit VPG wizard is displayed, enabling editing the VPG, including adding and removing virtual machines from the VPG.
Note: If the VPG was previously viewed, and the tab for this VPG is still displayed, you can access the details by selecting
the tab.
2. Make any required changes to the VPG definition. You can jump directly to a step to make a change in that step, for
example, the REPLICATION step or the RECOVERY step, by clicking the step. Steps that have been completed are marked
with a check.
3. Click DONE.
Note: The changed values are not applied to existing virtual machines but only to new virtual machines added to the VPG.
When a virtual machine is removed from a VPG, a warning is displayed. Another message is displayed when trying to save
the VPG, if a virtual machine is added to the VPG.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing VPGs 81
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing VPGs
The VPG is updated and then synchronized with the recovery site, if required, for example when the host was changed.
Note: Synchronization after deleting a virtual machine from a VPG results in all checkpoints being removed and the checkpoint
mechanism restarts after synchronization completes.
2. Configure the settings for the new virtual machines in the same way that you configured the other virtual machines in the
VPG, when you created the VPG.
3. Click DONE.
The virtual machines are added to the VPG. This process may take a few minutes. While the VPG definition is being updated,
you cannot perform any operation on the VPG, such as adding a checkpoint, editing its properties, or recovering it.
After the VPG definition has been updated, the protected and recovery sites are then synchronized. During the synchronization
period, the Protection Status displayed in the VPGs tab of the Zerto User Interface is: Meeting SLA n/m VMs
where n is the number of virtual machines that were originally in the VPG, and m is the total number of virtual machines in the
VPG, including the virtual machines that are currently being synced. While the virtual machines that were added are being
synced, the VPG can be failed over but the failover only includes the original virtual machines in the VPG.
For example, in the following screen shot, two virtual machines were added to the VPG, Operations, that originally contained 2
other virtual machines.
When the sync process for a virtual machine is complete, Zerto Virtual Manager tags the first checkpoint that includes a new
virtual machine with: VM ’XXX’ is fully synced
where XXX is the name of the virtual machine that was synced.
When you perform a recovery operation using one of these checkpoints, or any later checkpoint, all the virtual machines that
have completed syncing will be recovered.
For example, in the following screen shot, two virtual machines were added to the VPG Operations. When the sync process for
each machine completed, a checkpoint was added to show this. If you use the checkpoint written on Dec 20, 2015 at 15:39:48,
the recovery will include the virtual machine Clients but not FX history.
If you select the checkpoint at 15:40:03 or a later checkpoint, a recovery operation will also include the virtual machine FX
history.
If the virtual machine is added to a VPG replicating to a resource pool in VMware vSphere environments, Zerto Virtual
Replication checks that the additional virtual machine doesn’t exceed the resource pool capacity, such that the sum of the
virtual machine reservation is less than or equal to the resource pool CPU and storage settings.
Deleting a VPG
You can delete a VPG. Any offsite backups stored for the VPG are not deleted and the virtual machines that were backed up
can be restored.
Note: You cannot delete a VPG while a backup job is running.
To delete a VPG:
1. In the Zerto User Interface, click the VPGs or VMs tab and select one or more VPGs to delete.
2. Click MORE > Delete.
During recovery you pick a checkpoint in the journal and recover to this point. The crash-consistent checkpoints guarantee
write order fidelity.
For Example:
If write A on a virtual machine in the VPG occurred before write B on a virtual machine in the VPG, then when a checkpoint
is written, the journal will contain:
■ Neither of the writes
■ Both writes, and if they overlap the B data takes precedence
■ Only A – indicating the checkpoint occurred between A and B
The coordination is done by the Zerto Virtual Manager.
You can also integrate Microsoft Volume Shadow Copy Service (VSS) with Zerto Virtual Replication to ensure transaction
consistency in a Microsoft Windows server environment.
You can also use a script to place the application in a quiesced mode, such as Oracle Hot Backup mode, and execute the Zerto
Virtual Replication PowerShell cmdlet Set-Checkpoint, then release the quiesced mode. For more information about Zerto
Virtual Replication PowerShell cmdlets, see Zerto Virtual Replication Cmdlets.
Note:
■ VSS Checkpoint insertion is not supported in VPGs replicated from Azure.
■ To write application-consistent checkpoints, there is a performance impact on the virtual machine running the application
as a result of the application-consistent mechanism used, such as VSS. This is because the guest operating system and any
integrated applications will be quiesced.
This impact on performance may be negligible and does not always happen since not all applications require these
checkpoints in order to achieve successful application recovery. Also, Zerto Virtual Replication only requires the guest and
application to quiesce for a brief moment, just long enough to add a checkpoint.
As previously mentioned, checkpoints are recorded every few seconds in the journal. After a while, the number of checkpoints
available from which to choose a recovery point can be in excess of thousands per VPG.
When this threshold is reached, in order to enable efficient management and use of the checkpoints, the number of
checkpoints is diluted with respect to time, as follows:
■ Within the latest 2 hours: All of the checkpoints are available for recovery.
■ Between 2 and ~4.5 hours: There are about two to three checkpoints every 15 minutes.
■ From 4.5 hours and over: 1 checkpoint is kept every 15 minutes.
Note: Checkpoints which are either added manually, or added via the ZertoVssAgent, or marked as part of a Failover test
are not diluted.
This section describes the different options available to ensure application consistency:
■ “Adding a Checkpoint to Identify a Key Point”, below.
■ “Ensuring Transaction Consistency in Microsoft Windows Server Environments”, on page 89.
A list of VPGs is displayed with the requested VPG selected. You can select more VPGs to add the same checkpoint to, for
example, when something is happening at your site that affects multiple VPGs.
Note: Crash-consistency is per VPG and not across VPGs, even if a checkpoint was added to multiple VPGs.
2. Enter a name for the checkpoint.
3. Click SAVE.
When testing a failover, as described in “Testing Recovery”, on page 124, or actually performing a failover, as described in
“Managing Failover”, on page 147, you can choose the checkpoint as the point to recover to.
5. Specify the IP address and HTTP port number for the Zerto Virtual Managers managing the protection of the virtual
machines, both for the local site and optionally, for the paired, remote site. If the same hypervisor manager is used both for
protecting and recovering virtual machines, specify the IP address and HTTP port number for the single Zerto Virtual
Manager installed.
Note: The default HTTP port number when Zerto Virtual Replication is installed is 9080.
If you enter a wrong IP address or port you can correct the address or port after the installation completes by editing the
ZertoVssAgentGUI.exe.conf file in the ZertoVssAgent folder under the folder where the ZertoVssAgent is installed,
for example, C:\Program Files\Zerto.
6. Click OK.
The ZertoVssAgent is installed and the Add VSS Checkpoint is placed on the desktop. The agent runs as a Windows service,
ZertoVssprovider.
You can add a checkpoint to the Zerto Virtual Replication via the Add VSS Checkpoint dialog, via the command line or as a
scheduled task. The ZertoVssAgent ensures that the virtual machine is in an application consistent state and then sends the
checkpoint to the Zerto Virtual Manager, which then adds the checkpoint to the journals for the VPG containing that virtual
machine.
The checkpoint is logged for the entire VPG, however any other virtual machine in the VPG will have a crash-consistent
checkpoint.
To add a checkpoint while ensuring application consistency via the Add VSS Checkpoint dialog:
1. On a virtual machine where the ZertoVssAgent has been installed, click Start > Programs > Zerto Virtual Replication > Add
VSS Checkpoint or double-click the Add VSS Checkpoint icon on the desktop.
The Add VSS Checkpoint dialog is displayed.
To add a checkpoint while ensuring application consistency via the command line:
1. Open the command line dialog as an administrator.
2. Navigate to the directory where the ZertoVssAgent is installed. The default location is
C:\Program Files\Zerto\ZertoVssAgent\
3. In the command line, run the following:
ZertoVssAgent.exe <localURL> <localPort> <remoteURL> <remotePort> <checkpoint>
where:
localURL – The URL for the Zerto Virtual Manager that manages the protected site.
localPort – The HTTP port for the Zerto Virtual Manager that manages the protected site.
remoteURL – The URL for the Zerto Virtual Manager that manages the recovery site.
remotePort – The HTTP port for the Zerto Virtual Manager that manages the recovery site.
checkpoint – The name of the checkpoint.
Note: A message that the process was completed is displayed on the machine where the ZertoVssAgent is installed. The
handling of the checkpoint by the Zerto Virtual Manager is done asynchronously and you can check via the recent tasks list in
the Zerto User Interface that the checkpoint is added in the VPG.
To schedule checkpoints:
1. Open the Task Scheduler.
2. Under the Actions menu item, select Create Task.
The Create Task dialog is displayed.
5. Select the Actions tab and create a new action to start the ZertoVssAgent with the IP address and port of the Zerto Virtual
Manager and the checkpoint to use. For example:
C:\Program Files\Zerto\ZertoVssAgent\ZertoVssAgent.exe and
106.18.206.10 9080 106.18.206.10 9080 "VSSTaskCP"
That is, with the format: <protecting_ZVM_IP> 9080 <recovery_ZVM_IP> 9080 "<CP_name>"
6. Click OK.
7. Select the Settings tab and make changes as required. Make sure Stop the task if it runs longer than is not
selected.
8. Click OK.
There are certain permissions required for the Windows scheduled task to execute successfully. For example, you may see the
following in the event logs:
Volume Shadow Copy Service error: Unexpected error querying for the IVssWriterCallback
interface. hr = 0x80070005
This is often caused by incorrect security settings in either the writer or requestor process.
If this is the case, the service which runs the Windows Scheduled Task must have NT AUTHORITY\Network Service
permissions or be using the SYSTEM account to run the task. VSS operations are performed as NT AUTHORITY\Network
Service which is not granted COM access by default on the service assigned to Windows Scheduled Tasks.
The following procedure is only required if the windows scheduled task is using the Network Services account.
The correct permissions can be assigned by using the Component Services application, accessed by running
dcomcnfg.exe, in the windows guest.
To set COM permissions for VSS when “Access Denied” errors are received:
1. Run dcomcnfg.exe.
The Component Services dialog is displayed.
2. Expand the Component Services node to My Computer and right-click to access the Properties menu.
The My Computer Properties dialog is displayed.
3. Select the COM Security tab and click Edit Limits under Access Permissions.
4. Add the NETWORK SERVICE local access.
5. Click OK and verify that the user is now in the Access Permission list.
%ZertoHypervisorManagerIP% – The IP address of the hypervisor manager, VMware vCenter Server or Microsoft SCVMM,
where the VPG is recovered.
%ZertoHypervisorManagerPort% – The port used by the Zerto Virtual Manager to communicate with the hypervisor
manager, VMware vCenter Server or Microsoft SCVMM.
%ZertoForce% – A Boolean value, Yes/No, that dictates whether to abort the recovery operation if the script fails. For
example, whether to rollback a Move operation when the script fails and returns a non-zero value.
For example, if a specific VPG should not be migrated, the pre-recovery script can determine whether to continue based on the
values of the %ZertoOperation% and %ZertoVPGName%.
When specifying scripts in the definition of a VPG, enter values for the Pre-recovery Script and Post-recovery Script:
Command to run – The full path of the script to run. The script must be located on the same machine as the Zerto Virtual
Manager for the recovery site.
Params – The values of any parameters to pass to the script. Separate parameters with a space.
Timeout (sec) – The time-out in seconds for the script to run. If the script runs before executing a failover, move, or test
failover and the script fails or a timeout value is reached, an alert is generated and the failover, move, or test failover is not
performed. If the script runs after executing a failover, move, or test failover and the timeout value is reached, an alert is
generated. The default timeout value is specified in the Site Configuration Advanced Settings dialog.
Creating a Script
There are many ways to create scripts to run before or after recovering a VPG. The following procedure uses a Windows
PowerShell file (.ps1) or a batch (.bat) file.
To create a script:
1. Create a file on the machine where the Zerto Virtual Manager that manages the recovery is installed.
2. Enter the script that you want to run in the file.
3. Save the file as a Windows PowerShell file (.ps1) or batch (.bat) file.
When writing a PowerShell script, you can include the environment variables in the script. For example, the following code
snippet shows the use of the %ZertoOperation% and %ZertoVPGName% environment variables:
$Operation = $env:ZertoOperation
$VPG = $env:ZertoVPGName
$time = Get-Date
Note: Zerto recommends testing both PowerShell and batch scripts by running them from the command line, to ensure that
they run correctly.
Example Scripts
The following script is an example of how to track failover tests.
The following script, c:\ZertoScripts\TestedVPGs.bat, writes the VPG name and date to the
ListOfTestedVPGs.txt file every time a failover test is run:
SET isodt=%date:~10,4%-%date:~7,2%-%date:~4,2% %time:~0,2%-%time:~3,2%-%time:~6,2%
IF %1==Test ECHO %2 %isodt% >> c:\ZertoScripts\Results\TestedVPGs.txt
Where %1 is the first parameter in the list of parameters, %ZertoOperation%, and %2 is the second parameter in the list of
parameters, %ZertoVPGName%.
Note: If the file TestedVPGs.txt does not exist it is created, as long as the folder, c:\ZertoScripts\Results, exists.
2. Select the Export Protection Group Settings option and click Next.
3. Select the destination for the file to contain exported settings and specify the Zerto Virtual Manager IP address and port
where the VPGs are protecting virtual machines.
4. Click Next.
4. Select the file previously exported and enter the Zerto Virtual Manager IP address and port specified when exporting the
VPGs.
5. Click Next.
The list of exported VPGs is displayed.
6. Select the VPGs to import. Only VPGs with names that are not already defined can be imported. VPGs in the import files
with the same name as an existing VPG are disabled.
7. Click Next.
The list of imported VPGs is displayed. If the VPG could not be imported, the reason for the failure is specified.
Note: If a host was removed from and then re-added to the environment it is advisable to wait approximately 5 minutes
from when the host was re-added before performing the import of the VPGs.
8. Click Done.
to complete the synchronization is displayed under the VPG status, and if relevant, the synchronization trigger, such as
Network Congestion.
VPG Statuses
The following statuses are displayed:
STATUS SUBSTATUS COMMENT
Failing over – Before commit A VPG being failed over is in the initial stage, before
committing the failover.
Rolling back Failover The failover is being rolled back to prior to the failover.
History Not Meeting SLA See Not Meeting SLA, below. The VPG is meeting the RPO SLA setting.
Initial Sync
Syncing
Promoting
Not Meeting SLA Delta Sync (When Force Sync is not This status means that the VPG is not meeting the
applied) journal history nor RPO SLA settings.
Error
Needs configuration
Site disconnection
VM not protected
RPO Not Meeting SLA See Not Meeting SLA, above. The VPG is meeting the journal history SLA setting.
Bitmap Syncing In Azure, standard replication is achieved by a blob level mechanism which tracks changes in the
data volumes of protected virtual machines. When the VRA at the Azure site detects a list of
changed blocks, a bitmap that is saved persistently in the Azure block blob storage is updated.
The bitmap contains references to the areas of the protected disk that have changed but not the
actual I/Os.The bitmap is small and scales dynamically in correlation to the size of the changed
data.
Committing Move Completing the move, including removing the protected virtual machines.
Creating VPG The VPG is being created based on the saved definition.
Delta Syncing The Delta Sync uses a checksum comparison to minimize the use of network instances. A Delta
Sync is used when the protected virtual machine disks and the recovery disks should already be
synchronized, except for a possible few changes to the protected disks, for example:
■ After a VRA on the protected site was upgrade.
■ A Force Sync operation was manually initiated on the VPG.
■ A host protecting virtual machines was restarted and the protected virtual machines on the
host had not been moved to other hosts in the cluster or a protected virtual machine was
moved to another host without a VRA, and then moved back to the original host.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal but recovery operations
are still possible, assuming there are valid checkpoints in the journal. If a disaster occurs requiring
a failover during a delta synchronization, you can recover to the last checkpoint written to the
journal.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
SUBSTATUS DESCRIPTION
Delta syncing a disk Synchronization when only delta changes for a disk needs synchronizing.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal but recovery operations
are still possible, assuming there are valid checkpoints in the journal. If a disaster occurs requiring
a failover during a delta disk synchronization, you can recover to the last checkpoint written to the
journal.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
Error Problem situation, for example, when a ZVM is disconnected from a VRA used to protect virtual
machines. The VPG cannot be recovered until the problem is resolved,
Failing over - Before Preparing and checking the VPG virtual machines in the recovery site.
commit
Full Syncing Full synchronization to ensure that the protected disks and recovery disks are the same after
some change to the system. This type of sync is the same as an Initial Sync but occurs after
protection started. In general, this type of sync should not happen.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal. Also, recovery
operations are not possible.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
Full syncing a disk Synchronization when a full synchronization is required on a single disk.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During the synchronization, new checkpoints are not added to the journal. Also, recovery
operations are not possible.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
SUBSTATUS DESCRIPTION
Initial Sync Synchronization performed after creating the VPG to ensure that the protected disks and
recovery disks are the same. Recovery operations cannot occur until after the initial
synchronization has completed.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
Adding a virtual machine to a VPG is equivalent to creating a new VPG and an initial
synchronization is performed. In this case, any checkpoints in the journal become unusable and
only new checkpoints added after the initial synchronization completes can be used in a recovery.
The data in the journal however remains and is promoted to the recovered virtual machine as part
of a recovery procedure.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
Journal storage error There was an I/O error to the journal. For example, if the journal was full and the size was
increased. Once the problem is resolved a synchronization is required.
Moving - Before commit Preparing and checking the VPG virtual machines in the recovery site.
Promoting Updating recovered virtual machines in the VPG with data from the journal.
Recovery is possible Communication with the Zerto Virtual Manager at the protected site is down so continuing
protection is halted, but recovery on the remote site is available.
Recovery storage error There was an I/O error to the recovery storage. For example, the storage is almost full or the
virtual machines are turned off and the recovery disks are inaccessible.
Recovery storage profile The storage profile in the recovery site specified to be used by the VPG cannot be found.
error
Rolling back Rolling back to an initial status, for example, after canceling a cloning operation on the VPG.
Rolling back Failover Rolling back a Failover operation before committing it.
Rolling back Move Rolling back a Move operation before committing it.
Site disconnection Communication with the Zerto Virtual Manager at the remote, recovery, site is down so
continuing protection is halted.
Site disconnection. No Communication with the Zerto Virtual Manager at the remote, recovery, site is down and there
checkpoints are no checkpoints to use to recover the VPG at the recovery site.
User paused protection Protection is paused to enable solving a Journal disk space problem, for example, by increasing
the disk size or cloning the VPG.
SUBSTATUS DESCRIPTION
Disk Initial Sync Synchronization when a full synchronization is required on a single disk, for example, when
changing the target storage or adding a virtual machine to the VPG.
For synchronization to work, the protected virtual machines must be powered on so that the VRA
has an active IO stack, which is only available when the virtual machine is powered on.
During synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a disk Initial Sync.
Synchronization after a recovery starts after the promotion of data from the journal to the virtual
machine disks ends. Thus, synchronization of virtual machines can start at different times,
dependent on when the promotion for the virtual machine ends. All synchronizations are done in
parallel, whether a delta sync or full sync, etc.
VPG has no VMs A configured VPG where the virtual machines have been removed from it, for example when
changing both the storage and host for the virtual machines in the VPG, causes the VPG to be
recreated.
VPG waiting to be An attempt to remove the VPG failed and it must be forcibly removed. For details, see “Deleting a
removed VPG When the Status is Deleting”, on page 86.
Zerto Virtual Manager Protection is paused to enable solving a Journal disk space problem, for example, by increasing
paused protection the disk size or cloning the VPG.
Force Sync The user requested to synchronize the VPG, as described in “Forcing the Synchronization of a
VPG”, on page 85.
Network Congestion The network bandwidth is not wide enough to handle all the data, causing some of the data to
be backed up.
Recovery or Journal Storage There was an I/O error either to the recovery storage or journal, for example if the journal
Error was full and the size was increased. Once the problem is resolved a synchronization is
required.
Recovery Storage Congestion The recovery storage is being written to a lot, causing a delay for some of the data passed
from the protected site to be written to disk.
Recovery VRA Communication A network error, such as the network being down for a period, requires a synchronization of
Problem the VPG between the two sites, for example a bitmap sync.
VPG Configuration Changed The configuration of the VPG changed resulting in a synchronization being required. For
example, the size of the journal was changed.
The Zerto Virtual Manager runs as a Windows service and connects to Zerto Virtual Replication components, such as the VRA.
The following topics are described in this section:
■ “Check Connectivity Between Zerto Virtual Replication Components”, below
■ “Reconfiguring the Zerto Virtual Manager Setup” on page 105
■ “Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager”, on page 110
■ “Pair to Another Site and Unpairing Sites”, on page 110
2. Select the Test Connectivity to Zerto Virtual Replication components option and click Next.
The IP Connectivity dialog is displayed.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing a Zerto Virtual Manager 104
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing a Zerto Virtual Manager
The Client options tests the client; on completion a result dialog is displayed.
6. Click Stop (server test) or OK (client test) to return to the Zerto Virtual Replication Diagnostics dialog.
3. Click AUTHENTICATE.
The Microsoft Azure authentication page is displayed. The Azure Authentication dialog remains active.
The Azure Authentication dialog is displayed with fields populated by the Azure authentication.
8. Select the IP Address of the machine on which you are installing the Zerto Cloud Appliance. The protected site accesses
the Azure site through VPN using this IP.
9. Click NEXT.
HTTP Port (ZVM) – The port used for inbound communication between the Zerto Virtual Manager and Zerto internal
APIs, Cmdlets and a VSS Agent.
HTTPS Port (clients <->ZVM) – The port used for inbound communication between the Zerto User Interface and the
Zerto Virtual Manager.
TCP Port (ZVM <-> ZVMs) – The port used for communication between Zerto Virtual Managers. If you change the value,
when pairing sites, use the TCP port value you specify here. Pairing the sites is described in “Pairing an Azure Site”, on
page 20.
TCP Port (ZVM -> VBA) – The port used for communication between the Zerto Virtual Manager and the Virtual Backup
Appliance.
12. Click NEXT.
The Online Services and Zerto Mobile Application dialog is displayed.
Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager
When installing Zerto Virtual Replication, you can specify a Microsoft SQL Server database to use by the Zerto Virtual
Manager. If the access to this database changes, you can change the access in the Zerto Virtual Manager.
2. Select the Change SQL Server Credentials option and click Next.
The installation settings for the SQL Server are displayed. Change the IP and username and password if necessary.
Server Name – The domain name and server resource to connect to, with the format <server_name>\<instance_name>
or <Server_IP>\<instance_name>.
Specify either of the following authentication options:
Windows Authentication – Use Windows authentication. This option is only enabled if a specific service user account was
specified in the previous Service User dialog, in which case the service account name and password are used.
SQL Server Authentication – Use SQL Server authentication.
User Name – The user name for SQL Server database.
Password – A valid password for the given user name.
3. Click Next to the end of the wizard and then click Finish.
The Zerto Virtual Manager service is restarted using the new credentials.
Reconfiguring the Microsoft SQL Server Database Used by the Zerto Virtual Manager 110
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing a Zerto Virtual Manager
To pair to a site:
1. In the Zerto User Interface, in the SITES tab click PAIR.
The Add Site dialog is displayed.
Unpairing Sites
You can unpair any two sites that are paired to each other.
IMPORTANT: if there is a VPG on either of the sites you are unpairing, the VPGs will be deleted.
Zerto Virtual Replication provides a number of operations to recover virtual machines at the remote site. This section describes
these operations. The following topics are described in this section:
■ “The Failover Test Operation”, below
■ “The Move Operation”, on page 113
■ “The Failover Operation”, on page 114
■ “The Restore File Operation”, on page 115
■ “The Clone Operation”, on page 115
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Overview of Disaster Recovery Operations 112
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Overview of Disaster Recovery Operations
Before Move
Before Failover
Note: The Failover operation without reverse protection does not remove the VPG definition but leaves it in a Needs
Configuration state.
Before Clone
After Clone
There are a number of configuration tasks that you can perform, some of which should be done as part of the initial site
configuration.
The following topics are described in this section:
■ “Site Settings”, below
■ “Seeing What is Licensed”, on page 122
■ “About the Zerto Virtual Replication Version”, on page 123
Site Settings
The Site Settings dialog enables configuring various site settings. These include the maximum bandwidth that Zerto Virtual
Replication uses between the protected and recovery sites, default script timeout, and protection policies such as the commit
policy for a failover or move operation.
2. Make any required changes to the settings, click SAVE and then APPLY. The following settings can be defined:
■ “Editing Information About a Site”, below
■ “Defining Site Policies”, on page 119
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Advanced Site Configuration 117
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Advanced Site Configuration
2. Choose the Failover/Move Commit Policy to use during a failover or move operation, described in “Initiating a
Failover”, on page 148 and “Moving Protected Virtual Machines to a Remote Site”, on page 133 respectively. The following
options are available:
None – The failover or move operation must be manually committed or rolled back by the user.
Commit – After the time specified in the Default Timeout field the failover or move operation is committed, unless
manually committed or rolled back by the user before the time-out value is reached. During the specified time you can
check the recovered VPG virtual machines.
Rollback – After the time specified in the Default Timeout field the failover or move operation is rolled back, unless
manually committed or rolled back by the user before the time-out value is reached. During the specified time you can
check the recovered VPG virtual machines.
The value set here applies as the default for all failover or move operations from this point on but can be changed when
defining a failover or move operation.
3. Specify the Default Timeout after which a Commit or Rollback commit policy is performed. A value of zero indicates
that the system will automatically perform the commit policy, without waiting for any user interaction.
4. Choose the series from which to select the type. Azure series are optimized for different types of applications.
5. Choose the virtual machine size, within the series, to assign to recovered instances. Different types within a series vary
primarily in vCPU, ECU, RAM, and local storage size. The price per series is directly related to the series size.
6. Choose the Replication Pause Time, which is the time to pause when the journal might have problems, resulting in the
loss of all checkpoints, for example, when the datastore for the journal is near to being full.
The replication pause time is the amount of time that the transfer of data from the protected site to the journal on the
recovery site is paused. This time can then be used by the administrator to resolve the issue, for example by cloning the
virtual machines in the VPG, described in “Cloning Protected Virtual Machines to the Remote Site”, on page 155. The value
set here is applied to existing and new VPGs.
7. Click APPLY or SAVE.
Email Settings
2. Specify the SMTP server Address. The Zerto Virtual Manager must be able to reach this address.
3. If the SMTP Server Port was changed from the default, 25, specify the port number.
4. Specify a valid email address for the email sender name in the Sender Account field.
5. Specify a valid email address where you want to send the email in the To field.
You can test that the email notification is set up correctly by clicking Send Test Email. A test email is sent to the email
address specified in the To field.
6. Click APPLY or SAVE.
Enable Support notification and analytics – When selected, the CALLHOME feature is enabled, whereby analytics that are
sent to Zerto that are used to improve Zerto Virtual Replication. The CALLHOME also enables to automatically update Zerto
Virtual Replication when a new version of a hypervisor is released that is supported by Zerto.
Enable Online Services and Zerto Mobile – Allows licensed Zerto Virtual Manager users to enable or disable data being sent
from the Zerto Virtual Manager to the SaaS platform thereby enabling site monitoring using the Zerto Mobile App.
To see version information, prepare to send analytics to Zerto, or send data to the Cloud:
1. In the Zerto User Interface, in the top right of the header click SETTING ( ) and select Site Settings.
The Site Settings dialog is displayed.
2. Click About.
The version and build of Zerto Virtual Replication that are installed in the site are displayed.
3. If you want to send analytics to Zerto automatically, check Enable Support notification and analytics. This initiates the
CALLHOME feature. This information is used solely to improve Zerto Virtual Replication and to automatically update
Zerto Virtual Replication when a new version of a hypervisor is released that is supported by Zerto.
4. If you want Zerto Virtual Replication to send information to our Online Services and Zerto Mobile App, check Enable
Online Services and Zerto Mobile. This allows licensed Zerto Virtual Manager users to enable or disable data being sent
from the Zerto Virtual Manager to the SaaS platform, thereby enabling site monitoring using the Zerto Mobile App.
Note: The Enable Online Services and Zerto Mobile option is enabled by default.
If the Enable Online Services and Zerto Mobile option is enabled and the user un-checks the checkbox, the user
will receive a warning that unchecking Enable Online Services and Zerto Mobile Application will stop Zerto
Virtual Replication from sending information to Online Services and to the Zerto Mobile Application, rendering these
services inoperable for the entire installation.
In order to verify that the disaster recovery that you have planned is the one that will be implemented, Zerto recommends
testing the recovery of the VPGs defined in the protected site to the recovery site. This section describes how to test VPG
recovery to Azure.
The following topics are described in this section:
■ “The Test Failover Process”, below
■ “Starting and Stopping Failover Tests”, on page 125
■ “Viewing Test Results”, on page 129
■ “Live Disaster Recovery Testing”, on page 129
Note: You cannot perform a failover test while a backup job is running.
Note: When testing recovery from Azure to on-premise sites, the Move operation is used, which assures VM level consistency.
To allow checking before committing or rolling back, specify an amount of time to check the recovered machines, in minutes,
before the automatic commit or rollback action is performed. During this time period, check that the new virtual machines are
OK and then commit the operation or roll it back. The maximum amount of time you can delay the commit or rollback
operation is 1440 minutes, which is 24 hours.
Checking that involves I/O is done on scratch volumes. The longer this period the more scratch volumes are used, until the
maximum size is reached, at which point no more checking can be done. The maximum size of all the scratch volumes is
determined by the journal size hard limit and cannot be changed. The scratch volumes reside on the storage defined for the
journal.
For more information see “The Move Process” on page 140.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Testing Recovery 124
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Testing Recovery
When configuring a VPG, specify the period between tests for that VPG in the Test Reminder field in the REPLICATION step
of the Create VPG wizard.
■ When you create a virtual machine in Azure you are provided with a temporary volume automatically. This temporary
storage is D: on a Windows virtual machine and it is /dev/sdb1 on a Linux virtual machine.
■ Temporary volume size varies according to the instance size you have selected.
■ On Windows, the temporary volume will be using the next available drive letter.
For example: If you have two volumes connected to the protected virtual machine, Azure will use C and D, and allocate
E for the temporary volume drive.
To test failover:
1. In the Zerto User Interface set the operation to TEST and click FAILOVER.
The Failover Test wizard is displayed.
You can select the checkpoint to use for the recovery and see if a boot order and scripts are defined for the VPG.
4. By default, the last checkpoint added to the journal is displayed. If you want to use this checkpoint, go to the next step If
you want to change the checkpoint, click the checkpoint.
The {VPG-Name}: Checkpoints dialog is displayed.
5. Select the checkpoint to use. Click the refresh button to refresh the list. You can choose from one of the following
checkpoints:
Latest – Recovery is to the latest checkpoint. This ensures that the data is crash-consistent for the recovery. When
selecting the latest checkpoint, the checkpoint used is the latest at this point. If a checkpoint is added between this point
and starting the failover, this later checkpoint is not used.
Latest Tagged Checkpoint – The recovery operation is to the latest checkpoint added in one of the following situations:
■ By a user.
■ When a failover test was previously performed on the VPG that includes the virtual machine.
■ When the virtual machine was added to an existing VPG after the added virtual machine was synchronized.
Latest VSS – When VSS is used, the clone is to the latest VSS snapshot, ensuring that the data is both crash-consistent and
application consistent to this point. The frequency of VSS snapshots determines how much data can be recovered. For
details about VSS checkpoints, see “Ensuring Application Consistency – Checkpoints”, on page 86.
If you do not want to use the latest checkpoint, latest tagged checkpoint, or latest VSS checkpoint, choose Select from
all available checkpoints. By default, this option displays all checkpoints in the system. You can choose to display
only automatic, VSS, or tagged checkpoints, or any combination of these types.
6. Click OK.
7. Click NEXT.
The FAILOVER TEST step is displayed. The topology will show the VPGs and the virtual machines that are about to be
tested.
■ In the Zerto User Interface, click the VPGs tab, and then click on the name of a VPG you are testing.
A dynamic tab is created displaying the specific VPG details including the status of the failover test.
You can also stop the test via the TASKS popup dialog in the status bar, or by selecting MONITORING > TASKS.
During any live test, Zerto recommends that you only maintain one working version of the same virtual machine. Thus, the first
step in any test, except for a Failover Test, is to make sure that the protected virtual machines are shut down before starting to
test recovered machines. During a Zerto Virtual Replication Move operation the first step Zerto Virtual Replication performs is
to shut down the protected machines, to ensure data integrity. However, a Zerto Virtual Replication Failover operation
assumes that the protected virtual machines are no longer accessible (the total site disaster scenario) and does not attempt to
shut them down at the beginning of the operation. In a live test using a Failover operation you have to manually shut down the
virtual machines to be tested at the beginning of the test in order to prevent potential split-brain situations where two instances
of the same applications are live at the same time.
If you want to perform a live DR test that includes a simulated disaster you can simulate the disaster, for example, by
disconnecting the network between the two sites. In this type of test, once the disaster is simulated a Move operation cannot
be used, since it requires both sites to be healthy, while a Failover operation can be used.
Basic Verification – User Traffic Is Not Run against the Recovered VMs
Basic testing that the virtual machines can recover is done using either a Failover Test operation or an uncommitted Move
operation, using the Rollback setting.
Procedure
The Failover Test operation is described in detail in “Starting and Stopping Failover Tests”, on page 125. The following
highlights specific steps to enable using the Failover Test when recovering the virtual machines in a sandbox.
1. Change the VPG Failover Test Network to the production network used at the recovery site.
2. Manually shut down the virtual machines in the VPG.
3. Insert a new checkpoint. This avoids potential data loss since the virtual machines are shut down and the new checkpoint
is added after all I/Os have been written to disk.
4. Optionally simulate a disaster, for example by disconnecting the two sites.
5. Perform a test failover on the VPG, choosing the checkpoint you added in step 3.
Procedure
The Move operation is described in detail in “Moving Protected Virtual Machines to a Remote Site”, on page 133. The following
procedure highlights specific steps to enable using the Move functionality for a DR test.
1. In the Move wizard, in the EXECUTION PARAMETERS tab, for commit policy, select None.
2. Either power off the relevant virtual machines or check the Force Shutdown checkbox, in the EXECUTION PARAMETERS
tab, to make sure that the virtual machines are shut down, if they cannot be powered off using Microsoft Integration
Services.
3. After testing the new virtual machines in the recovery site you can roll back the Move operation, which will return the
virtual machines to their pre-test state.
Move Considerations
■ Changes from the pre-commit phase are not kept or applied to the protected applications.
■ The new virtual machines are connected to the network for a full test of the environment.
■ The protected machines are turned off until the end of the test, ensuring that there are no conflicts between the protected
site and recovery site.
■ You can only recover to the last checkpoint written to the journal, at the start of the Move operation.
This section describes a planned migration of a virtual protection group - VPG - to Azure. The following topics are described in
this section:
■ “The Move Process”, below
■ “Moving Protected Virtual Machines to a Remote Site”, on page 133
A move differs from a failover in that with a move you cannot select a checkpoint to restore the virtual machine to. Also, to
ensure data integrity, the protected virtual machines are powered off completely and a final checkpoint created so that there is
no data loss before the move is implemented.
You can initiate the Move operation from either the protected site or recovery site.
When you perform a planned migration of virtual machines to a recovery site, Zerto Virtual Replication assumes that both sites
are healthy and that you plan to relocate the virtual machines in an orderly fashion without loss of data.
Note: To recover virtual machines on the recovery site during disaster recovery, see“Managing Failover”, on page 147.
The Move operation has the following basic steps:
■ Shutting down the protected virtual machines gracefully. This ensures data integrity.
If the machines cannot be gracefully shut down, for example, when VMware Tools or Microsoft Integration Services is not
available, you must manually shut down the machines before starting the Move operation or forcibly power off the virtual
machines as part of the Move operation. If the machines cannot be gracefully shut down automatically and are not shut
down manually and the Move operation does not forcibly power them off, the Move operation stops and Zerto Virtual
Replication rolls back the virtual machines to their original status.
■ Inserting a clean checkpoint. This avoids potential data loss since the virtual machines are not on and the new checkpoint
is created after all I/Os have been written to disk.
■ Transferring all the latest changes that are still in the queue to the recovery site, including the new checkpoint.
■ Creating new virtual machines in the recovery site and attaching each new virtual machine to its relevant VHD disk, based
on the last checkpoint.
Note: The new virtual machines are created without CD-ROM or DVD drives, even if the protected virtual machines had
CD-ROM or DVD drives. Also, as long as the virtual machines are created, the operation is considered successful, even if
the virtual machines are not created with their complete definition, for example setting a private IP cannot be performed.
■ Powering on the new virtual machines, making them available to the user. If applicable, the boot order defined in the VPG
settings is used to power on the machines.
If the new virtual machine does not power on, the process continues and the new virtual machine must be powered on
manually.
■ By default, automatically committing the Move operation without testing. However, you can also run basic tests on the
new virtual machines to ensure their validity. Depending of the commit/rollback policy that you specified for the operation,
the operation is committed, finalizing the move, or rolled back, aborting the operation.
■ If Keep Source VMs is not selected, the protected virtual machines are removed from the protected site.
Note: If Keep Source VMs is not selected, and the virtual machines or vCD vApp are already protected in other VPGs,
continuing with the operation will cause the virtual machines or vCD vApp to be deleted from other VPGs that are
protecting them and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other virtual machines are
left to protect, the entire VPG will be removed.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Migrating a VPG to Azure 132
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Migrating a VPG to Azure
■ The default instance size for new virtual machines is Standard_D1_v2. If Standard_D1_v2 instance size does not meet your
needs, you can change this value in the Policies tab of the Site Settings dialog. For more information, see“Configuring
Disaster Recovery Policies”, on page 119. You can also change the instance size of new virtual machines when you create or
edit a VPG.
■ When you create a virtual machine in Azure you are provided with a temporary volume automatically. This temporary
storage is D: on a Windows virtual machine and it is /dev/sdb1 on a Linux virtual machine.
■ Temporary volume size varies according to the instance size you have selected.
■ On Windows, the temporary volume will be using the next available drive letter.
For example: If you have two volumes connected to the protected virtual machine, Azure will use C and D, and allocate
E for the temporary volume drive.
To initiate a move:
1. In the Zerto User Interface select ACTIONS > MOVE VPG.
The Move wizard is displayed.
You can change the following values to use for the recovery:
■ Commit Policy
■ Force Shutdown policy
■ Reverse Protection settings. For more information see “Reverse Protection For a Moved VPG”, on page 138.
■ Keep Source VMs - Prevents removal of the protected virtual machines at the Azure site.
Note: If reverse protection is specified, the Keep Source VMs option is grayed out because the virtual disks of the VMs
are used for replication and cannot have VMs attached. If Keep Source VMs is selected before reverse protection is
specified, the Keep Source VMs selection is canceled.
4. To change the commit policy, click the field or select the VPG and click EDIT SELECTED.
a) To commit the recovery operation automatically, with no testing, select Auto-Commit and 0 minutes.
b) Select None if you do not want an automatic commit or rollback. You must manually commit or roll back.
c) To test before committing or rolling back, specify an amount of time to test the recovered machines, in minutes.
This is the amount of time that the commit or rollback operation is delayed, before the automatic commit or rollback
action is performed.
During this time period, check that the new virtual machines are OK and then commit the operation or roll it back.
The maximum amount of time you can delay the commit or rollback operation is 1440 minutes, which is 24 hours.
Testing that involves I/O is done on scratch volumes.
■ The more I/Os generated, the more scratch volumes are used, until the maximum size is reached, at which point no
more testing can be done.
■ The maximum size of all the scratch volumes is determined by the journal size hard limit and cannot be changed.
■ The scratch volumes reside on the storage defined for the journal.
5. To specify reverse protection, whereby the virtual machines in the VPG are failed over to the recovery site and then
protected in the recovery site, back to the original site, either:
■ Click REVERSE PROTECT ALL. This activates reverse protection on all the VPGs that you plan to Failback. The system
default values for this procedure will be assigned to all the VPGs.
-or-
■ Click the Reverse Protection field.
If you want to configure the VPG for reverse protection, click the REVERSE link.
The Edit Reverse VPG wizard is displayed and you can edit the reverse protection configuration. The parameters are the
same as described when you create a VPG, described in “To protect from a VCenter server to a recovery site vCenter
server:”, on page 114, with the following differences:
■ You cannot add virtual machines to or remove virtual machines from the reverse protection VPG.
■ By default, reverse protection is to the original protected disks. You can specify a different storage to be used for the
reverse protection.
■ When replicating a VPG from Azure re-IP is always enabled. If VMware Tools or Microsoft Integration Services are
available for vSphere or Hyper-V respectively, for each virtual machine in the VPG, the IP address of the originally
protected virtual machine is used. Thus, during failback the original IP address of the virtual machine on the site where
the machine was originally protected is reused. However, if the machine does not contain the utility, DHCP is used.
The host version must be 4.1 or higher for re-IP to be enabled.
When committing the Failback, you can reconfigure reverse protection, regardless of the reverse protection settings
specified here. For more information see “Reverse Protection For a Moved VPG”, on page 138.
6. Click NEXT.
■ A warning appears informing the user that the virtual machines or vCD vApp will be removed from the other VPGs
that are protecting them.
■ If your VPG has a vCD vApp, or if there are no other virtual machines left to protect, the entire VPG will be removed.
7. Click OK.
The MOVE step is displayed. The topology will show the VPGs and the virtual machines that are about to be moved from
the on-premise site to Azure.
Note: If a virtual machines exists on the recovery site with the same name as a virtual machine being migrated, the
machine is moved and named in the recovery site with a number added as a suffix to the name, starting with the number 1.
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the Move operation, is written to a copy of the
recovery disks created during the move operation.
Note: You cannot take a snapshot of a virtual machine before the Move operation is committed and the data from the
journal promoted to recovery disks, since the virtual machine disks are still managed by the VRA and not directly by the
virtual machine. Taking a snapshot of a machine that is in the process of being moved will corrupt that machine.
10. After checking the virtual machines on the recovery site, choose one of the following:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Click the Commit or Rollback icon ( ) in the specific VPG tab.
■ Click Commit to confirm the commit.
■ Click Rollback to roll back the operation, removing the virtual machines that were created on the recovery site and
rebooting the machines on the protected site. The Rollback dialog is displayed to confirm the rollback.
You can also commit or roll back the operation via the TASKS popup dialog in the status bar, or by selecting
MONITORING > TASKS.
After the new virtual machines are up and running and committed in the recovery site, the powered off virtual machines in the
protected site are removed from the protected site. Finally, data is copied from the journal to the recovery disks copies,
attached to the new virtual machines in Azure.
Notes:
■ If virtual machines or vCD vApp are already protected in several VPGs, and reverse protection is configured, the virtual
machines or vCD vApp are deleted from the protected site. This will result in the removal of these virtual machines from
other VPGs that are protecting them and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other
virtual machines are left to protect, the entire VPG will be removed.
Protecting virtual machines in several VPGs is enabled only if both the protected site and the recovery site, as well as the
VRAs installed on these sites, are of version 5.0 and higher.
■ If Keep Source VMs is selected, the protected virtual machines are not removed from the protected site.
The default instance size for new virtual machines is Standard_D1_v2. If Standard_D1_v2 instance size does not meet your
needs, you can change this value in the Policies tab of the Site Settings dialog. For more information, see“Configuring Disaster
Recovery Policies”, on page 119. You can also change the instance size of new virtual machines when you create or edit a VPG.
Note: By default, every Azure virtual machine is created with an additional temporary volume. This temporary volume is a local
SSD disk. The size of the SSD disk depends on the instance size of the virtual machine.
If you did not define a private IP for a virtual machine in the VPG definition, during recovery Azure sets the private IP from the
defined subnet range.
Note: If the new virtual machines do not power on, the process continues and the new virtual machines must be manually
powered on.
Notes:
■ If Keep Source VMs is not selected, and virtual machines or vCD vApp are already protected in several VPGs, the virtual
machines or vCD vApp are deleted from the protected site. This will result in the removal of these virtual machines from
other VPGs that are protecting them and to the journals of these VPGs to be reset. In the event of vCD vApp or if no other
virtual machines are left to protect, the entire VPG will be removed.
Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the recovery site,
as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ You can edit the VPG definition from either of the sites, the site where the VPG virtual machines were initially protected or
the site they were moved to.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Migrating a VPG From Azure to an On-Premise Site 140
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Migrating a VPG From Azure to an On-Premise Site
■ The VRAs installed on these sites are of version 5.0 and higher.
■ Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ If Reverse Protection is specified for the Failback (Move) operation, the protected virtual machines in Azure are placed in a
Stopped (Deallocated) state. The virtual disks previously used by the virtual machines in the protected Azure site are used
for reverse protection. A sync is required since the recovered machines can be updated while data is being promoted. The
VPGs are reverse protected back to Azure, and an Initial Sync is performed as preseeding is not supported.
■ The data from the journal is promoted to the machines. The machines can be used during the promotion and Zerto Virtual
Replication ensures that the user sees the latest image, even if this image, in part, includes data from the journal.
You can change the following values to use for the recovery:
■ Commit Policy
■ Force Shutdown - Select Yes / No. Selecting YES places the VMs in a Stopped (Deallocated) state.
■ Reverse Protection settings. For more information see “Reverse Protection For a Moved VPG”, on page 145.
■ Keep Source VMs - Prevents removal of the protected virtual machines at the Azure site.
Note: If reverse protection is specified, the Keep Source VMs option is grayed out because the virtual disks of the VMs
are used for replication and cannot have VMs attached. If Keep Source VMs is selected before reverse protection is
specified, the Keep Source VMs selection is canceled.
4. To change the commit policy, click the field or select the VPG and click EDIT SELECTED.
a) To commit the recovery operation automatically, with no testing, select Auto-Commit and 0 minutes.
b) Select None if you do not want an automatic commit or rollback. You must manually commit or roll back.
c) To test before committing or rolling back, specify an amount of time to test the recovered machines, in minutes.
This is the amount of time that the commit or rollback operation is delayed, before the automatic commit or rollback
action is performed.
During this time period, check that the new virtual machines are OK and then commit the operation or roll it back.
The maximum amount of time you can delay the commit or rollback operation is 1440 minutes, which is 24 hours.
Testing that involves I/O is done on scratch volumes.
■ The more I/Os generated, the more scratch volumes are used, until the maximum size is reached, at which point no
more testing can be done.
■ The maximum size of all the scratch volumes is determined by the journal size hard limit and cannot be changed.
■ The scratch volumes reside on the storage defined for the journal.
5. To specify reverse protection, whereby the virtual machines in the VPG are failed over to the recovery site and then
protected in the recovery site, back to the original site, either:
■ Click REVERSE PROTECT ALL. This activates reverse protection on all the VPGs that you plan to Failback. The system
default values for this procedure will be assigned to all the VPGs.
-or-
■ Click the Reverse Protection field.
If you want to configure the VPG for reverse protection, click the REVERSE link.
The Edit Reverse VPG wizard is displayed and you can edit the reverse protection configuration. The parameters are the
same as described when you create a VPG, described in “To protect from a VCenter server to a recovery site vCenter
server:”, on page 114, with the following differences:
■ You cannot add or remove virtual machines in the reverse protected VPG.
■ By default, reverse protection is to the original protected disks. You can specify a different storage to be used for the
reverse protection.
■ If VMware Tools or Microsoft Integration Services are available for vSphere or Hyper-V respectively, for each virtual
machine in the VPG, the IP address of the originally protected virtual machine is used. Thus, during failback the
original IP address of the virtual machine on the site where the machine was originally protected is reused. However, if
the machine does not contain the utility, DHCP is used. The host version must be 4.1 or higher for re-IP to be enabled.
When committing the Failback, you can reconfigure reverse protection, regardless of the reverse protection settings
specified here. For more information see “Reverse Protection For a Moved VPG”, on page 145.
6. Click NEXT.
7. Click OK.
The MOVE step is displayed. The topology will show the VPGs and the virtual machines that are about to be moved from
Azure to the on-premise site.
Note: If a virtual machine exists on the recovery site with the same name as a virtual machine being migrated, the machine
is moved and named in the peer site with a number added as a suffix to the name, starting with the number 1
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the Move operation, is written to thin-provisioned
virtual disks, one per virtual machine in the VPG. These virtual disks are automatically defined when the machines are
created on the recovery site for testing. The longer the test period the more scratch volumes are used, until the maximum
size is reached, at which point no more testing can be done. The maximum size of all the scratch volumes is determined by
the journal size hard limit and cannot be changed. The scratch volumes reside on the storage defined for the journal. Using
these scratch volumes makes committing or rolling back the Move operation more efficient.
Note: You cannot take a snapshot of a virtual machine before the Move operation is committed and the data from the
journal promoted to the moved virtual machine disks, since the virtual machine volumes are still managed by the VRA and
not directly by the virtual machine. Taking a snapshot of a machine that is in the process of being moved will corrupt that
machine.
10. After checking the virtual machines on the recovery site, choose one of the following:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Click the Commit or Rollback icon ( ) in the specific VPG tab.
■ Click Commit to confirm the commit and, if necessary set, or reset, the reverse protection configuration. If the
protected site is still up and you can set up reverse protection, you can reconfigure reverse protection by checking
the Reverse Protection checkbox and then click the Reverse link. Configuring reverse protection here
overwrites any of settings defined when initially configuring the failover.
■ Click Rollback to roll back the operation, removing the virtual machines that were created on the recovery site and
rebooting the machines on the protected site. The Rollback dialog is displayed to confirm the rollback.
You can also commit or roll back the operation in the TASKS popup dialog in the status bar or under
MONITORING > TASKS.
After the virtual machines are up and running and committed in the recovery site, the powered off virtual machines in the
protected site are removed from Azure. Finally, data is promoted from the journal to the moved virtual machines.
During promotion of data, you cannot move a host on the moved virtual machines. If the host is rebooted during promotion,
make sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before starting up the
recovered virtual machines.
Note: If the virtual machines do not power on, the process continues and the virtual machines must be manually powered on.
The virtual machines cannot be powered on automatically in a number of situations, such as when there are not enough
resources in the resource pool or the required MAC address is part of a reserved range or there is a MAC address conflict or IP
conflict, for example, if a clone was previously created with the MAC or IP address.
When a vCD vApp is moved to a vCenter Server recovery site, a vCenter Server vCD vApp is created in the recovery site. If
reverse protection was specified, the VPG state is Needs Configuration and the VPG must be recreated by protecting the
virtual machines in the vCD vApp as separate machines and not as part of the vCD vApp.
This section describes how to perform a failover to Microsoft Azure after an unforeseen disaster. The following topics are
described in this section:
■ “The Failover Process”, below
■ “Initiating a Failover”, on page 148
■ “Initiating a Failover During a Test”, on page 154
Note: If you need to perform a failover while a backup job is running, the backup job is aborted to enable the failover to run.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing Failover 147
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Managing Failover
for the operation after testing either the operation is committed, finalizing the failover, or rolled back, aborting the
operation.
■ If the protected site is still available, for example, after a partial disaster, the original protected site virtual machines are not
powered off and are not removed.
■ When you create a virtual machine in Azure you are provided with a temporary volume automatically. This temporary
storage is D: on a Windows virtual machine and it is /dev/sdb1 on a Linux virtual machine.
■ Temporary volume size varies according to the instance size you have selected.
■ On Windows, the temporary volume will be using the next available drive letter.
For example: If you have two volumes connected to the protected virtual machine, Azure will use C and D, and allocate
E for the temporary volume drive.
■ If the D:/ drive is occupied by the temporary Azure disk, recovered virtual machines in Azure require re-mapping the
volumes drive letters. See
https://docs.microsoft.com/en-us/azure/virtual-machines/virtual-machines-windows-classic-change-drive-letter
Initiating a Failover
You can initiate a failover, whereby the virtual machines in the virtual protection group are replicated to a set checkpoint in
Azure.
You can initiate a failover to the last checkpoint recorded in the journal, even if the protected site is no longer up. You can
initiate a failover during a test, as described in “Initiating a Failover During a Test”, on page 154.
If you have time to initiate the failover from the protected site you can. However, if the protected site is down, you initiate the
failover from Azure.
Note: Any VPGs that are in the process of being synchronized, cannot be recovered, unless the synchronization is a bitmap
synchronization.
WARNING: A different static IP should not be configured for virtual machines with a Linux operating system. Configuring a
different static IP for these machines will cause them not to boot.
To initiate a failover:
1. In the Zerto User Interface set the operation to LIVE and click FAILOVER.
The Failover wizard is displayed.
The Direction arrow shows the direction of the process: from the protected site to the peer, recovery, site.
3. Click NEXT.
The EXECUTION PARAMETERS step is displayed.
You can change the following values to use for the recovery:
■ Commit Policy
■ Force Shutdown policy
■ Reverse Protection settings. For more information see “Reverse Protection for a Failed Over VPG”, on page 153.
You can also see if scripts are defined for the VPG.
4. By default, the last checkpoint added to the journal is displayed. If you want to use this checkpoint, go to the next step. If
you want to change the checkpoint, click the checkpoint.
The {VPG-Name}: Checkpoints dialog is displayed.
5. Select the checkpoint to use. Click the refresh button to refresh the list. You can choose from one of the following
checkpoints:
Latest VSS – When VSS is used, the clone is to the latest VSS snapshot, ensuring that the data is both crash-consistent and
application consistent to this point. The frequency of VSS snapshots determines how much data can be recovered. For
details about VSS checkpoints, see “Ensuring Application Consistency – Checkpoints”, on page 86.
6. Click OK.
7. To change the commit policy, click on the field or select the VPG and click EDIT SELECTED.
a) To commit the recovery operation automatically, without any checking, select Auto-Commit and 0 minutes.
b) If you do not want an automatic commit or rollback, select None. You must manually commit or roll back.
To allow checking before committing or rolling back, specify an amount of time to check the recovered machines, in
minutes, before the automatic commit or rollback action is performed. During this time period, check that the new virtual
machines are OK and then commit the operation or roll it back. The maximum amount of time you can delay the commit or
rollback operation is 1440 minutes, which is 24 hours.
8. To specify the shutdown policy, double-click the VM Shutdown field and select the shutdown policy:
No (default) – The protected virtual machines are not touched before starting the failover. This assumes that you do not
know the state of the protected machines, or you know that they are not serviceable.
Yes – If the protected virtual machines have a utility such as VMware Tools or Microsoft Integration Services available, the
virtual machines are gracefully shut down, otherwise the Failover operation fails. This is similar to performing a Move
operation to a specified checkpoint.
Force Shutdown – The protected virtual machines are forcibly shut down before starting the failover. This is similar to
performing a Move operation to a specified checkpoint. If the protected virtual machines have VMware Tools or Microsoft
Integration Services available, the procedure waits five minutes for the virtual machines to be gracefully shut down before
forcibly powering them off.
9. Click NEXT.
10. Click OK. If a virtual machine is deleted from other VPGs, the journals of these VPGs are reset.
The FAILOVER step is displayed. The topology shows the number of VPGs and virtual machines being failed over to each
recovery site. In the following example, 2 VPGs will be failed over to Site6-Ent2-R2, and they contain 5 virtual machines;
and 1 VPG will be failed over to Site5-Ent2-P2-R2 and it contains 2 virtual machines.
The failover starts by creating the new virtual machines on Azure to the point-in-time specified: either the last data
transferred from the protected site or to one of the checkpoints written in the journal.
Note: If a virtual machine exists on Azure with the same name as a virtual machine being failed over, the machine is
created and named in the peer site with a number added as a suffix to the name, starting with the number 1.
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the failover operation, is written to VHD disks. These
virtual disks are automatically defined when the virtual machines are created on Azure for testing.
Note: You cannot take a snapshot of a virtual machine before the failover operation is committed and the data from the
journal promoted to the moved virtual machine disks, since the virtual machine volumes are still managed by the VRA and
not directly by the virtual machine. Using a snapshot of a recovered machine before the failover operation has completed
will result in a corrupted virtual machine being created.
13. After checking the virtual machines in Azure, choose one of the following:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Click the Commit or Rollback icon ( ) in the specific VPG tab.
Click Commit. The Commit dialog is displayed to confirm the commit.
Click Rollback to roll back the operation, removing the virtual machines that were created on the recovery site and
rebooting the machines on the protected site. The Rollback dialog is displayed to confirm the rollback.
You can also commit or roll back the operation via the TASKS popup dialog in the status bar, or by selecting
MONITORING > TASKS.
The default instance size for new virtual machines is Standard_D1_v2. If Standard_D1_v2 instance size does not meet your
needs, you can change this value in the Policies tab of the Site Settings dialog. For more information, see “Configuring Disaster
Recovery Policies”, on page 119. You can also change the instance size of new virtual machines when you create or edit a VPG.
Note: By default, every Azure virtual machine is created with additional temporary volume. This volume is in addition to the
volumes associated with each protected virtual machine.
If you did not define a private IP for a virtual machine in the VPG definition, during recovery Azure sets the private IP from the
defined subnet range.
Note: If the new virtual machines do not power on, the process continues and the virtual machines must be manually powered
on.
■ If you do not specify Reverse Protection, the VPG definition is kept with the status Needs Configuration and the reverse
settings in the VPG definition are not set.
■ Clicking EDIT VPG displays the Edit VPG wizard with the settings filled in, using the original settings for the virtual machines
in the VPG from the original protected site, except for the volumes. To start replicating the virtual machines in the VPG,
specify the disks to use for replication and optionally, make any other changes to the original settings and click DONE.
■ The ZVM on the protected and recovery sites are of version 5.5 and higher.
■ The VRA installed on the recovery site is of version 5.5 and higher.
Protecting virtual machines or a vCD vApp in several VPGs is enabled if:
■ The protected site and the recovery site are of version 5.0 and higher
■ The VRAs installed on these sites are of version 5.0 and higher.
You can create a clone of each virtual machine in a VPG. The clone is a copy of the protected virtual machine, located on the
recovery site, while the virtual machine on the protected site remains protected and live.
The following topics are described in this section:
■ “The Clone Process”, below
■ “Cloning Protected Virtual Machines to the Remote Site”, on page 155
Note: You cannot clone virtual machines in a VPG test while a backup job is running.
To clone a VPG:
1. In the Zerto User Interface, in the VPGs tab click on the name of the VPG to be cloned.
A new tab is added to the Zerto User Interface, with the name of the VPG that you clicked. The tab displays data about the
VPG.
Note: If the VPG was previously viewed, and the tab for this VPG is still displayed, you can access the details by selecting
the tab.
2. Click MORE > Offsite Clone.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Cloning a VPG to Azure 155
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Cloning a VPG to Azure
3. If you intend to use the last checkpoint, which is displayed in the dialog, go to step 6.
To select the checkpoint, click SELECT A CHECKPOINT.
The {VPG-Name}: Checkpoints dialog is displayed.
Latest VSS – When VSS is used, the clone is to the latest VSS snapshot, ensuring that the data is both crash-consistent and
application consistent to this point. The frequency of VSS snapshots determines how much data can be recovered. For
details about VSS checkpoints, see “Ensuring Application Consistency – Checkpoints”, on page 86.
If you do not want to use the latest checkpoint, latest tagged checkpoint, or latest VSS checkpoint, choose Select from
all available checkpoints. By default, this option displays all checkpoints in the system. You can choose to display
only automatic, VSS, or tagged checkpoints, or any combination of these types.
5. Click OK.
6. Click CLONE.
The cloning starts and the status is displayed in the VPG details tab.
The cloned machines are named with names of the protected machines with the timestamp of the checkpoint used for the
clone. The cloned virtual machines are not powered on.
Virtual machines with disks that are less than 1GB are recovered with disks of 1GB. Additional volumes might be created in the
cloned virtual machine, depending on the virtual machines size used for the clone. These volumes can be ignored.
You can recover specific files and folders from the recovery site for virtual machines that are being protected by Zerto Virtual
Replication and running Windows operating systems. You can recover the files and folders from a specific point-in-time. Thus,
you can recover files and folders for a virtual machine for as far back as the journal history is configured.
This section describes how to recover files and folders. The following topics are described in this section:
■ “The File and Folder Recovery Process”, below
■ “Recovering Files and Folders”, on page 159
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Recovering Files and Folders 158
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Recovering Files and Folders
Mounting the Disk that Contains the Required Files and Folders
Before you can recover files or folders, you must first select the checkpoint in time from which you will recover the files or
folders. Then you must select and access the disk in which the files or folders are contained.
The list of all protected virtual machines is displayed. You can only recover files or folders from one virtual machine at a
time.
2. Select the virtual machine on which the file or folder is located and click NEXT.
The DISK step is displayed. All disks associated with the selected virtual machine are displayed.
o
5. Select a disk to mount and click NEXT.
The MOUNT step is displayed. The settings you selected are displayed.
7. Continue with “Downloading the Files and Folders from the Disk” on page 162.
2. Click NEXT.
The FILE/FOLDER step is displayed.
The selected files or folders are displayed in the right pane of the dialog. The number of items selected is displayed and the
size of the selected files is also displayed.
4. Click NEXT.
The DOWNLOAD step is displayed. It shows the files and folders you selected for downloading. By default, when you select
multiple files or one or more folders, the data is compressed before it is downloaded. If you select only one file, for
download, you can choose whether or not the file is compressed.
Note: Saving the files and folders to a network share is dependent on the browser used to display the Zerto User Interface
and the settings for this browser.
■ When you select one file to download, and do not compress the file, the name of the downloaded file is the name of
the file. For example, if you download a file called Important-file.docx, the name of the file on your computer will
be Important-file.docx.
■ When you choose one file and choose to compress it, or you select multiple files, the files are zipped into a file called
ZertoDownloads.zip.
6. Zerto recommends that you unmount the disk after the files or folders are downloaded. To unmount the disk, click the
unmount icon ( ).
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Failing Back (Moving) from Azure to an On-Premise Site 166
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Failing Back (Moving) from Azure to an On-Premise Site
■ The ZVM on the protected and recovery sites are of version 5.5 and higher.
■ The VRA installed on the recovery site is of version 5.5 and higher.
Protecting virtual machines or a vCD vApp in several VPGs is enabled if:
■ The protected site and the recovery site are of version 5.0 and higher
■ The VRAs installed on these sites are of version 5.0 and higher.
■ Protecting virtual machines or vCD vApps in several VPGs is enabled only if both the protected site and the
recovery site, as well as the VRAs installed on these sites, are of version 5.0 and higher.
■ If Reverse Protection is specified for the Failback (Move) operation, the protected virtual machines in Azure are placed in a
Stopped (Deallocated) state. The virtual disks previously used by the virtual machines in the protected Azure site are used
for reverse protection. A sync is required since the recovered machines can be updated while data is being promoted. The
VPG’s are reverse protected back to Azure, and an Initial Sync is performed as preseeding is not supported.
■ The data from the journal is promoted to the machines. The machines can be used during the promotion and Zerto Virtual
Replication ensures that the user sees the latest image, even if this image, in part, includes data from the journal.
You can change the following values to use for the recovery:
■ Commit Policy
■ Force Shutdown - Select Yes / No. Selecting YES places the VMs in a Stopped (Deallocated) state.
■ Reverse Protection settings. For more information see “Reverse Protection For a Moved VPG”, on page 172.
■ Keep Source VMs - Prevents removal of the protected virtual machines at the Azure site.
Note: If reverse protection is specified, the Keep Source VMs option is grayed out because the virtual disks of the VMs
are used for replication and cannot have VMs attached. If Keep Source VMs is selected before reverse protection is
The MOVE step is displayed. The topology will show the VPGs and the virtual machines that are about to be moved from
Azure to the on-premise site.
Note: If a virtual machine exists on the recovery site with the same name as a virtual machine being migrated, the machine
is moved and named in the peer site with a number added as a suffix to the name, starting with the number 1
The status icon changes to orange and an alert is issued, to warn you that the procedure is waiting for either a commit or
rollback.
All testing done during this period, before committing or rolling back the Move operation, is written to thin-provisioned
virtual disks, one per virtual machine in the VPG. These virtual disks are automatically defined when the machines are
created on the recovery site for testing. The longer the test period the more scratch volumes are used, until the maximum
size is reached, at which point no more testing can be done. The maximum size of all the scratch volumes is determined by
the journal size hard limit and cannot be changed. The scratch volumes reside on the storage defined for the journal. Using
these scratch volumes makes committing or rolling back the Move operation more efficient.
Note: You cannot take a snapshot of a virtual machine before the Move operation is committed and the data from the
journal promoted to the moved virtual machine disks, since the virtual machine volumes are still managed by the VRA and
not directly by the virtual machine. Taking a snapshot of a machine that is in the process of being moved will corrupt that
machine.
9. After checking the virtual machines on the recovery site, choose one of the following:
■ Wait for the specified Commit Policy time to elapse, and the specified operation, either Commit or Rollback, is
performed automatically.
■ Click the Commit or Rollback icon ( ) in the specific VPG tab.
■ Click Commit to confirm the commit and, if necessary set, or reset, the reverse protection configuration. If the
protected site is still up and you can set up reverse protection, you can reconfigure reverse protection by checking
the Reverse Protection checkbox and then click the Reverse link. Configuring reverse protection here
overwrites any of settings defined when initially configuring the failover.
■ Click Rollback to roll back the operation, removing the virtual machines that were created on the recovery site and
rebooting the machines on the protected site. The Rollback dialog is displayed to confirm the rollback.
You can also commit or roll back the operation in the TASKS popup dialog in the status bar or under
MONITORING > TASKS.
After the virtual machines are up and running and committed in the recovery site, the powered off virtual machines in the
protected site are removed from Azure. Finally, data is promoted from the journal to the moved virtual machines.
During promotion of data, you cannot move a host on the moved virtual machines. If the host is rebooted during promotion,
make sure that the VRA on the host is running and communicating with the Zerto Virtual Manager before starting up the
recovered virtual machines.
Note: If the virtual machines do not power on, the process continues and the virtual machines must be manually powered on.
The virtual machines cannot be powered on automatically in a number of situations, such as when there are not enough
resources in the resource pool or the required MAC address is part of a reserved range or there is a MAC address conflict or IP
conflict, for example, if a clone was previously created with the MAC or IP address.
When a vCD vApp is moved to a vCenter Server recovery site, a vCenter Server vCD vApp is created in the recovery site. If
reverse protection was specified, the VPG state is Needs Configuration and the VPG must be recreated by protecting the
virtual machines in the vCD vApp as separate machines and not as part of the vCD vApp.
When using Zerto Virtual Replication for offsite backups, you must first define the repository that will be used to store the
backups.
Disaster recovery using Zerto Virtual Replication enables recovering from a disaster to any point between the moment just
before the disaster and a specified amount of time in the past up to 30 days. The recovery is done in real time at the recovery
site with a minimal RTO.
If there is an additional requirement to extend the recovery ability to more than 30 days, Zerto Virtual Replication provides an
offsite back up option that enables saving the protected virtual machines offsite for up to one year in a state where they can be
easily deployed.
The virtual machine files are saved in a repository for the required period. Each virtual machine can have multiple offsite
backups created according to a fixed schedule.
The offsite backups are managed by a Windows service, the Virtual Backup Appliance (VBA). The VBA is installed as part of
the Zerto Virtual Replication installation. During an offsite backup, the VBA communicates with the VRAs on the recovery site
to create the virtual machine files, such as the configuration and virtual disk files in a repository. The offsite backups are fixed
points saved either weekly or monthly in the repository. Before you can create an offsite backup for virtual machines, you must
first create one or more repositories for the offsite backup jobs.
The following offsite backup set up options are described in this section:
■ “Creating an Offsite Backup Repository”, below
■ “Editing an Offsite Backup Repository”, on page 176
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Offsite Backup configuration 174
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Offsite Backup configuration
You can define more than one repository. When defining offsite backup, you specify which repository to use.
Recovery Reports
Information about recovery operations — failover tests, moves, and failovers — can be displayed in Recovery Reports under the
REPORTS tab. The information includes the following:
■ The name of the virtual protection group (VPG) on which the operation was done
■ The type of operation
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Zerto Virtual Replication Reports 178
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Zerto Virtual Replication Reports
Status – Select the statuses for which you want information: Success, Failed. If more than one status is selected, the number
of statuses you selected is displayed.
Click APPLY to apply the selected filtering.
Click RESET to reset the display to the default values.
Click EXPORT and choose PDF or ZIP to generate a report.
If the report is exported to a PDF, information is displayed by VPG and then by virtual machine within the VPG. The following
information is described in the report.
■ The date and time when the report was generated.
The Recovery Operation Details include the following information:
■ The name of the person who initiated the operation
■ The type of recovery operation
■ The point in time
■ The start time
■ The end time
■ RTO
■ The result
■ Notes
The Virtual Protection Group Recovery Settings includes the following:
■ The name of the protected site
■ The name of the recovery site
The Virtual Machine Recovery Settings, which include the following:
■ The name of the virtual machine
■ Any custom settings
The Detailed Recovery Steps, which include the following:
■ The step number
■ The description of the step (for example, creating a machine and scratch volumes for testing)
■ Whether the step was successful or not
■ The start and end time of the step
■ The time it took to complete the step
Note: When failover test (FOT) is still in progress, the End Time in the Recovery Report appears as NA.
The Recovery Operation Start Time and Recovery Operation End Time values are shown in UTC according to the Zerto Virtual
Manager clock in the recovery site. The Point in Time value takes the checkpoint UTC time, which was created in protected site,
and converts it to the recovery site time zone.
Resources Report
Information about the resources used by the virtual machines being recovered to a particular site is displayed in the Resources
report under the REPORTS tab. The information is collected at fixed times that are defined in the Reports tab of the Site Settings
dialog in the recovery site. Information for the report is saved for 90 days when the sampling period is hourly and for one year
when the sampling period is daily.
The report collects the resource information for the virtual machines being recovered to the site where the report is run.
If no virtual machines are recovered to the site where the report is run, the report is empty.
You can filter the information by the following:
From and To – The dates for which you want information.
Click EXPORT to generate the report, which is produced as an Excel file.
The information presented in this report is divided into three tabs:
Details Tab – Shows information for each protected virtual machine.
Performance Tab – Shows bandwidth and throughput information for each virtual machine in a table and in a graph.
Target Host Tab – Shows information per host in the recovery site.
Details Tab
The Details tab includes the names and IDs of the virtual machines being protected and, for each virtual machine, the
timestamp for the information, where it is protected, the CPU used, the memory used by the host and the guest, the storage
used, and other information.
PARAMETER DESCRIPTION
Source Volumes Provisioned Storage The amount of provisioned storage for the virtual machine in the source site. This
(GB) value is the sum of volumes’ provisioned size.
Source Volumes Used Storage (GB) The amount of storage used by the virtual machine in the source site. This value is the
sum of the volumes’ used size.
Source VRA Name The name of the source VRA used to send data to the recovery site.
Target Cluster The target cluster name hosting the virtual machine.
Target Datastores The target storage used by the virtual machine if it is recovered.
Target Host The target host name hosting the virtual machine when it is recovered.
Target Organization vDC The name of the target vDC organization.
Target Resource Pool The target resource pool name where the virtual machine will be recovered.
Target Site The target site name, defined in the Zerto User Interface.
Target Storage Profile The target vCD storage profile used.
Target vCD Organization The name of the target vCD organization.
Target VRA Name The name of the VRA managing the recovery.
Throughput (Bps) The average throughput of the VM used between two consecutive samples, in bytes
per second.
Timestamp The date and time the resource information was collected. The value can be
converted to an understandable date using code similar to the following:
var date = new Date(jsonDate);
or code similar to the Perl code example, jsonDateToString($), described in Zerto
Virtual Replication RESTful API Reference Guide.
VM Hardware Version The VMware hardware version.
VM Id The internal virtual machine identifier.
VM Name The name of the virtual machine.
VPG Name The name of the VPG.
VPG Type The VPG type:
VCVpg – VMware vCenter Server
VCvApp – Deprecated
VCDvApp – VMware vCloud Director vApp
PublicCloud – Amazon WebServices or Microsoft Azure
HyperV – Microsoft SCVMM
ZORG The name assigned to an organization using a cloud service provider for recovery. The
name is created in the Zerto Cloud Manager. For details, see the Zerto Cloud Manager
Administration Guide.
Performance Tab
The Performance tab shows bandwidth and throughput information for each virtual machine per sampling period in a table and
in a graph. The Performance tab enables the user to view the total bandwidth and throughput per sampling period.
The graph allows the user to view performance trends over time per VM.
For full explanation of the bandwidth and throughput information, refer to the “Details Tab”, on page 181.
You can filter information by date and VM name.
VPG Performance
Performance graphs for all VPGs or for an individual VPG can be seen in the VPG Performance report under the REPORTS tab.
These graphs show more detailed resolution than the corresponding graphs in the DASHBOARD tab.
You can specify the VPGs whose performance should be displayed. When you request information about multiple VPGs, each
VPG is shown in a different color, with a key at the top of the report that maps each color to the VPG it represents.
Position the cursor on a graph line to see exact information about that point.
Click APPLY to apply the selected filtering and produce the report.
Click RESET to reset the display to the default values.
Backup Report
Information about offsite backups can be sent as a report every day or weekly on a specified day. To set up the report, select
Site Settings > Email Settings.
You can handle problems related to the WAN connecting the protecting or recovery sites, or other problems using a variety of
diagnostic and troubleshooting tools.
The following topics are described in this section:
■ “Ensuring the Zerto Virtual Manager is Running”, below
■ “Troubleshooting: “Needs Configuration” Problems”, on page 188
■ “Troubleshooting VRA Problems”, on page 188
■ “Zerto Virtual Replication Diagnostics Utility”, on page 188
■ “Collecting Zerto Virtual Replication Logs”, on page 189
■ “Understanding the Logs”, on page 194
For details about Zerto Virtual Manager alarms, alerts, and events, refer to Zerto Virtual Replication Guide to Alerts and Events.
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Troubleshooting 187
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Troubleshooting
The following scenarios result in the VPG status changing to Needs Configuration:
■ A protected disk resize operation fails, for example when there is not enough disk space.
■ When a volume is added to a protected virtual machine and the VPG settings are not updated because of a site
disconnection or a Microsoft Azure error. In some situations, after the sites reconnect, the state corrects itself
automatically.
Note: A separate installation kit is available for download from the Zerto Support Portal downloads page that installs the Zerto
Virtual Replication Diagnostics utility as a standalone utility on any Windows machine that has Microsoft .NET Framework
4.5.2 installed.
2. Click the drop down menu to display the remote log collection options.
4. Click Save.
2. Select the Collect the Zerto Virtual Replication logs for use by Zerto support option.
3. Click Next.
The Initialize dialog is displayed.
Case Number – The case number assigned by Zerto support, if one already exists. Optional.
Description – An optional free text description of the reason for collecting the logs.
After clicking Next the utility connects to the Zerto Virtual Replication and if any alerts have been issued, they are
displayed in the Select Alerts dialog.
If there are no alerts, this dialog is skipped.
5. Select any alerts that need analyzing from the list and click Next.
The Select VPGs dialog is displayed.
6. Select the VPGs that you want analyzed and click Next.
The Customize dialogs are displayed. With Azure these values are not relevant.
7. Click Next until the Save Log Destinations dialog is displayed.
Check that you have specified everything you want to collect and if you want to make changes, click Back to change the
selection.
11. Click Start.
The data is collected and stored in the destination file which, by default, is timestamped. If specified, the collection is also
sent to an FTP site.
Note: The log collection is performed on the server. Canceling the collection in the GUI does not stop the collection from
continuing on the server and a new log collection cannot be run until the running collection finishes.
When the log collection has completed the result is displayed. For example:
12. Click Done to return to the Zerto Virtual Replication Diagnostics menu dialog.
13. Send the log to Zerto support, unless the Automatically upload files to Zerto FTP Server option was specified,
in which case it is automatically sent to Zerto.
To collect local Zerto Virtual Manager logs when the Zerto Virtual Manager is not running:
1. Open the Zerto Diagnostics application. For example, via Start > Programs > Zerto Virtual Replication > Zerto Diagnostics.
The Zerto Virtual Replication Diagnostics menu dialog is displayed.
2. Select the Local Zerto Virtual Manager diagnostics option and click Next.
You are prompted to use the first option to collect more comprehensive diagnostics. If you continue, the Initialize dialog is
displayed.
7. Click Done to return to the Zerto Virtual Replication Diagnostics menu dialog.
8. Send the log to Zerto support, unless the Automatically upload files to Zerto FTP Server option was specified,
in which case it is automatically sent to Zerto.
Configuration and management of disaster recovery for a site are performed in the Zerto User Interface.
The following dialogs and tabs are described in this section:
■ “Add Checkpoint Dialog”, below
■ “Add Site Dialog”, on page 197
■ “Add Static Route Dialog”, on page 197
■ “Advanced Journal Settings Dialog”, on page 198
■ “Advanced Journal Settings Dialog (vCD)”, on page 199
■ “Advanced VM Recovery Settings Dialog”, on page 200
■ “Advanced VM Replication Settings Dialog”, on page 201
■ “Advanced VM Replication Settings Dialog (vCD)”, on page 202
■ “Advanced VM Settings for Cloud Dialog”, on page 203
■ “ALERTS”, on page 203
■ “Boot Order Dialog”, on page 204
■ “Browse for File Dialog”, on page 205
■ “Change Host Password VRA Dialog”, on page 205
■ “Change VM Recovery VRA Dialog”, on page 206
■ “Checkpoints Dialog”, on page 207
■ “Configure and Install VRA Dialog”, on page 208
■ “Configure Paired Site Routing Dialog”, on page 209
■ “Configure Provider vDCs Dialog”, on page 210
■ “Configure VM Settings Dialog”, on page 211
■ “Configure Volume Dialog (vCD)”, on page 211
■ “Edit NIC Dialog”, on page 212
■ “Edit Selected Volumes Dialog”, on page 213
■ “Edit VM Dialog”, on page 213
■ “Edit VM Dialog (vCD)”, on page 214
■ “Edit VM Settings Dialog (Azure)”, on page 215
■ “Edit vNIC Dialog”, on page 216
■ “Edit vNIC Dialog (vCD)”, on page 217
■ “Edit Volumes Dialog”, on page 217
■ “Edit Volumes Dialog (vCD)”, on page 219
■ “Edit VRA Dialog”, on page 220
■ “Manage Static Routes Dialog”, on page 221
■ “New Repository Dialog” on page 222
■ “Offsite Clone Dialog”, on page 223
■ “Offsite Clone Dialog”, on page 223
■ “Open Support Ticket Dialog”, on page 223
■ “Remote Support Dialog”, on page 225
■ “Site Settings Dialog”, on page 225
■ “Stop Failover Test Dialog”, on page 231
■ “TASKS”, on page 232
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
The Zerto Virtual Manager User Interface 195
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
The Zerto Virtual Manager User Interface
Checkpoints are recorded automatically every few seconds in the journal. These checkpoints ensure crash-consistency and are
written to the virtual machine journals by the Zerto Virtual Manager. Each checkpoint has a timestamp set by the Zerto Virtual
Manager. In addition to the automatically generated checkpoints, you can manually add checkpoints to identify events that
might influence the recovery, such as a planned switch over to a secondary generator.
The list of VPGs is displayed. You can select more VPGs to add the same checkpoint.
Enter a name for the checkpoint – The name to assign to the checkpoint.
Dir – The direction of the protection.
VPG Name – The name of the VPG.
Protected Site Name – The name of the site where virtual machines are protected.
Recovery Site Name – The name of the site where protected virtual machines are recovered.
You can filter columns in the list via the filter icon next to each column title. You can also sort the list by each column. Clicking
the cog on the right side of the table enables you to change the columns that are displayed and to create a permanent view of
the columns you want displayed.
Pair sites
Remote Site ZVM IP Address – IP address or fully qualified DNS host name of the remote site Zerto Virtual Manager to pair to.
Port – The TCP port communication between the sites. Enter the port that was specified during installation. The default port
during the installation is 9081.
Address – The network address for the static route that you want to route to.
Subnet Mask – The subnet mask for the network.
Gateway – The gateway address for the network on the local network of the Zerto Cloud Connector cloud network interface.
Note: If you change the Zerto Virtual Manager and VRAs cloud network, changing the static route settings for a group to the
new network only changes the access for new Zerto Cloud Connectors with the specified group. Existing Zerto Cloud
Connectors must be redeployed to use the changed static route.
Displays the recovery settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED.
Displays the replication settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED. For more details, see “Edit VM Dialog” on page 213.
Displays the recovery settings for the virtual machines in the VPG. You can choose to edit information in one field by clicking
the field and updating the information. You can choose to edit information for several virtual machines at the same time by
selecting the virtual machines and clicking EDIT SELECTED.
ALERTS
Monitor the recent alerts by clicking the ALERTS area in the status bar at the bottom of the Zerto User Interface. The following
information is displayed for the most recent alerts:
■ The alert status.
■ The site where the alert is issued.
■ A description of the alert.
Click See All Alerts to access MONITORING > ALERTS.
To specify the boot order of virtual machines in a VPG. When machines are started up on recovery, for example, after a move
operation, the virtual machines in the VPG are not started up in a particular order. If you want specific virtual machines to start
before other machines, you can specify a boot order. The virtual machines are defined in groups and the boot order applies to
the groups and not to individual virtual machines in the groups. You can specify a delay between groups during startup.
Initially, virtual machines in the VPG are displayed together under the default group. If you want specific machines to start
before other virtual machines, define new groups with one or more virtual machines in each group.
There is no boot order for virtual machines within a group, only between groups.
ADD GROUP button – Adds a group. After adding a group you can edit the group name by clicking the Edit icon at the right of
the group name and remove the group via the delete icon at the right of the group. You cannot remove the Default group nor
a group that contains a virtual machine.
Boot Delay – Specifies a time delay between starting up the virtual machines in the group and starting up the virtual machines
in the next group. For example, assume three groups, Default, Server, and Client defined in this order. The Start-up delay defined
for the Default group is 10, for the Server group is 100 and for the Client group 0. The virtual machines in the Default group are
started together and after 10 seconds the virtual machines in the Server group are started. After 100 seconds the virtual
machines in the Client group are started up.
To select the folder with the preseeded disk to use. Drill-down to select the disk.
Note: Disks that are not viable for preseeding are grayed out.
To change the connectivity, VIB or password, used by the VRA to connect to the host. If using a password to connect to the
host, to change the password used by the VRA.
■ If the VRA is using a password to connect to the host and using VIB is required, check Use credentials to connect to host.
■ If the VRA is using VIB to connect to the host and using a password is required, uncheck Use credentials to connect to host
and enter the password. To display the password in plain text, click in the checkbox next to the field.
■ If the VRA is connecting to the host with a password and the password for the host has changed, enter the new password.
To display the password in plain text, click in the checkbox next to the field.
To change the recovery host required by the VRA to access the host.
Alert icon status indicator – The color indicates the status of the alert:
■ Green icon – The virtual machine can be moved to the replacement host.
■ Red icon – The virtual machine cannot be moved to the replacement host.
Direction – The direction of the replication, from this site to the remote site or from the remote site to this site.
VM Name – The name of the virtual machine.
VPG Name – The name of the VPG.
ZORG – The Zerto name given to the organization, the ZORG, by a cloud service provider. For details, refer to Zerto Cloud
Manager Administration Guide.
VM Size GB – The virtual machine size in gigabytes.
# of Volumes – The number of volumes used by the virtual machine.
VM Hardware Version – The hardware version of the virtual machine.
Select the replacement host – The name of the host to move the recovery virtual machines information.
Checkpoints Dialog
Host – The host on which the VRA is installed. The drop-down displays the hosts that do not have a VRA installed, with the
selected host displayed by default.
From ESXi 5.5, by default, Zerto Virtual Manager uses a vSphere Installation Bundle, VIB, to connect to the host. When using
VIB:
■ The user does not enter a password.
■ Once a day, Zerto Virtual Manager checks that the VRA and host can connect. If the connection fails, Zerto Virtual
Manager re-initiates the connection automatically and logs it.
For ESX/i versions earlier than 5.5, when using a password, root access is required. Once a day, Zerto Virtual Manager checks
that the password is valid. If the password was changed, an alert is issued, requesting the user enter the new password.
Use credentials to connect to host – When unchecked, the Zerto Virtual Manager uses VIB to connect to the host. This
field is only relevant for ESXi 5.5 and later.
Host Root Password – When the VRA should connect to the host with a password, check Use credential to connect to host
and enter the root user password used to access the host. When the box on the right side is checked, the password is
displayed in plain text.This field is only relevant for ESXi 4.x and 5.x hosts. This field is disabled for ESX 4.x hosts.
Datastore – The datastore that the VRA will use for protected virtual machine data on the recovery site, including the journals.
You can install more than one VRA on the same datastore.
Network – The network used to access the VRA.
VRA RAM – The amount of memory to allocate to the VRA. The amount determines the maximum buffer size for the VRA for
buffering IOs written by the protected virtual machines, before the writes are sent over the network to the recovery VRA. The
recovery VRA also buffers the incoming IOs until they are written to the journal. If a buffer becomes full, a Bitmap Sync is
performed after space is freed up in the buffer.
AMOUNT OF VRA RAM VRA BUFFER POOL SIZE
1GB 450MB
2GB 1450MB
3GB 2300MB
3GB 2300MB
Configuration – Either have the IP address allocated via a static IP address or a DHCP server. The Static option is the
recommended option.
Address – The IP address for the VRA.
Subnet Mask – The subnet mask for the network. The default value is 255.255.255.0.
Default Gateway – The default mask for the network.
The IP address, subnet mask, and gateway to access the peer site VRAs when access to the peer site VRAs is not via the
default gateway.
Enable Paired Site Routing – When checked, enables paired site routing.
Address – The IP address of the next hop at the local site, the router, or gateway address that is used to access the peer site
network.
Subnet Mask – The subnet mask for the peer site network.
Gateway – The gateway for the peer site network.
These access details are used to access the VRAs on the peer site.
The settings in the Configure Paired Site Routing dialog apply to all VRAs installed after the information is saved. Any existing
VRA is not affected and access to these VRAs continues via the default gateway. If the default gateway stops being used, you
must reinstall the VRAs that were installed before setting up paired site routing.
Specifies the values to use when restoring the selected virtual machines.
Restore on Host – The IP address of the host where you want the virtual machine restored.
Restore on Datastore – The datastore to use for the restored virtual machine files.
Power On – Check this if you want the restored virtual machine to be powered on.
Replication takes ownership of the preseeded disk, moving it from its source folder to the folder used by the VRA. Note
that if the virtual machine has more than one preseeded disk, these disks must reside on the same datastore. If the
preseeded disk is greater than 1TB on NFS storage, the VPG creation might fail. This is a known VMware problem when the
NFS client does not wait for sufficient time for the NFS storage array to initialize the virtual disk after the RPC parameter of
the NFS client times out. The timeout default value is 10 seconds. Refer to the VMware documentation, http://
kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1027919, which
describes the configuration option to tune the RPC timeout parameter using the esxcfg-advcfg -s <Timeout> /NFS/
SetAttrRPCTimeout command.
If the VPG is being defined for a Zerto Organization, ZORG, the location of the preseeded disk must be defined in the Zerto
Cloud Manager. For details, refer to Zerto Cloud Manager Administration Guide.
Note: Zerto Virtual Replication supports the SCSI protocol. Only disks that support this protocol can be specified.
Specify the NIC settings when restoring an offsite backup to the recovery site.
NIC Name – The name of the selected NIC.
Network – The network to use for the restored virtual machine.
Create new MAC address – The Media Access Control address (MAC address) to use. The default is to use the same MAC
address for the restored virtual machine that was used in the protected site. Check the box to create a new MAC address on
the restore site.
Change vNIC IP Configuration – Whether or not to keep the default virtual NIC (vNIC) IP configuration. The vNIC IP is changed
after the restore has completed when VMware Tools are installed. If Static is selected, the IP address, subnet mask, and default
gateway must be set. If DHCP is selected, the IP configuration and DNS server configurations are assigned automatically, to
match the protected virtual machine.
IP Address – The IP for the restored virtual machine. This can be the same IP as the original protected virtual machine.
Subnet Mask – The subnet mask for the network. The default value is 255.255.255.0.
Default Gateway – The default mask for the network.
Preferred DNS Server– The IP address of the primary DNS server to handle Internet protocol mapping.
Alternate DNS Server – The IP address of the alternate DNS server.
DNS Suffix – The DNS name excluding the host.
Edit VM Dialog
Unlimited – The size of the journal is unlimited and it can grow to the size of the recovery datastore. If Unlimited is chosen,
the fields Size and Percentage are not relevant.
Size (GB) – The maximum journal size in GB.
Percentage – The percentage of the virtual machine volume size the journal can grow to.
Journal Size Warning Threshold – The size of the journal that triggers a warning that the journal is nearing its hard limit.
Unlimited – The size of the journal is unlimited and it can grow to the size of the recovery datastore. If Unlimited is chosen,
the fields Size and Percentage are not relevant.
Size (GB) – The size in GB that will generate a warning.
Percentage – The percentage of the virtual machine volume size that will generate a warning.
Both the value of Size and Percentage must be less than the configured hard limit so that the warning will be generated when
needed. In addition to the warning threshold, Zerto Virtual Replication will issue a message when the free space available for
the journal is almost full.
Journal Datastore – The datastore used for the journal data for each virtual machine in the VPG. To change the default, specify
a host and then select one of the datastores accessible by this host to be used as the journal datastore. When you select
specific journal datastore, the journals for each virtual machine in the VPG are stored in this datastore, regardless of where the
recovery datastores are for each virtual machine. In this case, all the protected virtual machines must be recovered to hosts
that can access the specified journal datastore.
Edit the network settings for one or more virtual machines in a VPG that will be recovered to AWS. There are recovery settings
for failovers and moves, and for failover tests.
VNet: A The virtual network dedicated to your Azure subscription.
Subnet: A range of IP addresses in your VPC.
Network Security Group: The Azure network security to be associated with the virtual machines in this VPG. You can associate
one or more network security groups with the virtual machines.
Instance Family:– The instance family from which to select the type. Azure instance families are optimized for different types
of applications. Choose the instance family appropriate for the application in the virtual machine protected in the VPG.
Instance Type: The instance size, within the instance family, to assign to recovered instances. Different sizes within an
instance family vary primarily in vCPU, ECU, RAM, and local storage size. The price per instance is directly related to the
instance size.
Private IP: The private IP of an instance from the selected subnet. If you do not set the private IP, during recovery, Azure sets
the private IP from the defined subnet range.
To configure the NIC used for the replicated VM disks. You can configure a maximum of four NICs.
Note: You can only change the vNIC IP for virtual machines with VMware Tools running.
Specify the network details to use for the recovered virtual machines after a live recovery or migration, in the Failover/Move
column, and for the recovered virtual machines when testing replication, in the Test column.
Network – The recovery site network to use. For testing, this network can be a fenced-out network to avoid impacting the
production network.
Create New MAC Address – Whether the Media Access Control address (MAC address) used on the protected site should be
replicated on the recovery site. The default is to use the same MAC address on both sites.
Change vNIC IP Configuration – Whether or not to keep the default virtual NIC (vNIC) IP configuration. You can only change
the vNIC IP after recovery has completed with VMware Tools installed.
To change the vNIC IP, select Yes in the Failover/Move or Test column. If you select a static IP connection, set the IP address,
subnet mask, and default gateway. Optionally, change the preferred and alternate DNS server IPs and the DNS suffix. If you
select DHCP, the IP configuration and DNS server configurations are assigned automatically, to match the protected virtual
machine. You can change the DNS suffix.
If the virtual machine has multiple NICs but is configured to only have a single default gateway, fill in a 0 for each octet in the
Default gateway field for the NICs with no default gateway.
Note: During a failover, move, or test failover, if the recovered virtual machine is assigned a different IP than the original IP,
after the virtual machine has started it is automatically rebooted so that it starts up with the correct IP. If the same network is
used for both production and test failovers, Zerto recommends changing the IP address for the virtual machines started for the
test, so that there is no IP clash between the test machines and the production machines.
Copy to failover test – When clicked, copies the settings in the Failover/Move column to the Test column.
Copy to failover/move – When clicked, copies the settings in the Test column to the Failover/Move column.
Datastore
Datastore – A new volume is used for replicated data. Specify the datastore to use to create disks for the replicated data. If the
source disk is thin provisioned, the default for the recovery volume is that it is also thin provisioned.
The datastore specified for replication must have at least the same amount of space as the protected volume and an additional
amount for the journal. The amount of additional space needed for the journal can be fixed by specifying a maximum size for
the journal, or can be calculated as the average change rate for the virtual machines in the VPG, multiplied by the length of time
specified for the journal history.
You can use the vSphere Client console Performance tab for each virtual machine to help estimate the change rate. Zerto Virtual
Replication supports the SCSI protocol. Only disks that support this protocol can be specified.
RDM
Raw Disk – The VMware RDM (Raw Device Mapping) to use for the replication: By default, RDM is recovered as thin-
provisioned VMDK in the datastore specified in the VM Recovery Datastore field in the Edit VM dialog, and not to RDM. You
cannot define an RDM disk if the virtual machine uses a BusLogic SCSI controller, nor when protecting or recovering virtual
machines in an environment running vCenter Server 5.x with ESX/ESXi version 4.1 hosts. Only a raw disk with the same size as
the protected disk can be selected from the list of available raw disks. Other raw disks with different sizes are not available for
selection. The RDM is always stored in the recovery datastore used for the virtual machine. The following limitations apply to
protecting RDM disks:
■ RDM disks with an even number of blocks can replicate to RDM disks of the same size with an even number of blocks and
to VMDKs.
■ RDM disks with an odd number of blocks can only replicate to RDM disks of the same size with an odd number of blocks
and not to VMDKs.
Preseeded volume
Whether to copy the protected data to a virtual disk in the recovery site. Zerto recommends using this option particularly for
large disks so that the initial synchronization will be faster since a Delta Sync can be used to synchronize any changes written
to the recovery site after the creation of the preseeded disk. When not using a preseeded disk, the initial synchronization phase
must copy the whole disk over the WAN. When using a preseeded virtual disk, you select the datastore and exact location,
folder, and name of the preseeded disk, which cannot be an IDE disk. Zerto Virtual Replication takes ownership of the
preseeded disk, moving it from its source folder to the folder used by the VRA. Only disks with the same size as the protected
disk can be selected when browsing for a preseeded disk. The datastore where the preseeded disk is placed is also used as the
recovery datastore for the replicated data.
If the preseeded disk is greater than 1TB on NFS storage, the VPG creation might fail. This is a known VMware problem when
the NFS client does not wait for sufficient time for the NFS storage array to initialize the virtual disk after the RPC parameter of
the NFS client times out. The timeout default value is 10 seconds. See the VMware documentation, http://kb.vmware.com/
selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1027919, which describes the configuration
option to tune the RPC timeout parameter using the esxcfg-advcfg -s <Timeout> /NFS/SetAttrRPCTimeout
command.
Note the following conditions:
■ If the protected disks are non-default geometry, configure the VPG using preseeded volumes.
■ If the protected disk is an RDM disk, it can be used to preseed to a recovery VMDK disk. Zerto Virtual Replication makes
sure that the VMDK disk size is a correct match for the RDM disk.
■ If the VPG is being defined for a Zerto Organization, ZORG, the location of the preseeded disk must be defined in the Zerto
Cloud Manager. For details, see Zerto Cloud Manager Administration Guide.
Datastore – The datastore where the preseeded disk is located.
Path – The full path to the preseeded disk.
Temporary Data Disk – If the virtual machine to be replicated includes a temp data disk as part of its configuration, specify a
mirror disk for replication that is marked as a temp data disk. In this case, data is not replicated to the temp data disk after
initial synchronization.
Thin provisioning – If the recovery volumes are thin-provisioned or not.
initialize the virtual disk after the RPC parameter of the NFS client times out. The timeout default value is 10 seconds. Refer
to the VMware documentation, http://kb.vmware.com/selfservice/microsites/
search.do?language=en_US&cmd=displayKC&externalId=1027919, which describes the configuration option to tune the
RPC timeout parameter using the esxcfg-advcfg -s <Timeout> /NFS/SetAttrRPCTimeout command.
If the VPG is being defined for a Zerto Organization, ZORG, the location of the preseeded disk must be defined in the Zerto
Cloud Manager. For details, refer to Zerto Cloud Manager Administration Guide.
Zerto Virtual Replication supports the SCSI protocol. Only disks that support this protocol can be specified. Virtual
machine RDMs in a vCenter Server are replicated as VMDKs in a vCD environment.
Temp Data Disk – If the virtual machine to be replicated includes a temp data disk as part of its configuration, specify a mirror
disk for replication that is marked as a temp data disk. In this case, data is not replicated to the temp data disk after initial
synchronization.
Zerto Virtual Replication supports the SCSI protocol. Only disks that support this protocol can be specified.
Thin provisioning – If the recovery volumes are thin-provisioned or not.
To change the network settings for a VRA, for example when the gateway to the VRA is changed.
Host – The IP of the host on which the VRA is installed.
For ESXi 5.5 and later hosts, by default, Zerto Virtual Manager uses a vSphere Installation Bundle, VIB, to connect to the host.
When using VIB:
■ The user does not enter a password.
■ Once a day, Zerto Virtual Manager checks that the VRA and host can connect. If the connection fails, Zerto Virtual
Manager re-initiates the connection automatically and notes this in the log.
When using a password, root access is required if the Zerto host component is down and needs an automatic restart. Once a
day, Zerto Virtual Manager checks that the password is valid. If the password was changed, an alert is triggered, requesting the
user enter the new password.
Use credentials to connect to host – When unchecked, the Zerto Virtual Manager uses VIB to connect to the host. This
field is only relevant for ESXi 5.5 and later.
Host Root Password – When the VRA should connect to the host with a password, check Use credential to connect to host
and enter the root user password used to access the host. When the box on the right side is checked, the password is
displayed in plain text.This field is only relevant for ESXi 4.x and 5.x hosts. This field is disabled for ESX 4.x hosts.
VRA Group – The free text to identify the group to which a VRA belongs. If you create a group and then change the name when
editing the VRA so that there is no VRA in the site that belongs to the originally specified group, the group is automatically
deleted from the system.
To create a new group, enter the new group name over the text New group and click CREATE.
Configuration – Either have the IP address allocated via a static IP address or a DHCP server. If the VRA was originally installed
with a static IP, you cannot change this to DHCP. If the VRA was originally installed to use a DHCP server, you can change this
to use a static IP.
Address – The static IP address for the VRA to communicate with the Zerto Virtual Manager.
Subnet Mask – The subnet mask for the network. The default value is 255.255.255.0.
Default Gateway – The default mask for the network.
When providing DR as a Service, the cloud service provider needs to ensure complete separation between the organization
network and the cloud service provider network. The cloud service provider needs to be able to route traffic between an
organization network and the cloud replication network, in a secure manner without going through complex network and
routing setups.
The cloud service provider can define a Zerto Cloud Connector per organization site, that has two Ethernet interfaces, one to
the organization’s network and one to the cloud service provider's network. If the cloud service provider wants to add
additional security, considering both cloud connector interfaces as part of the organization network, the cloud service provider
can define a static route that will hop to a different cloud network, specifically for use by the Zerto Virtual Manager and VRAs
in the cloud site.
ADD – Click this field to add an entity and to define the static route it will use. Once you click ADD, the dialog changes:
NEW GROUP – Defines a group that will use a static route to the subnet used by the Zerto Virtual Manager. Enter the name of
the organization that will use this static route.
Add Static Route – Opens the Add Static Route Dialog.
Free Space – The amount of free space currently available for the repository.
Used Space – The amount of space currently used in the repository.
Capacity – The overall capacity of the repository.
VALIDATE – Click to validate the path. The path must be valid in order to save the information.
Enable compression – Check this option to compress backups stored in the repository. Compression is done using zip
compression, set to level six. If you want better compression, which requires more CPU, or less compression to reduce the CPU
overhead, contact Zerto support.
Note: Compression usually reduces the effectiveness of deduplication on stored data. If the backup repository resides on a
deduplication-enabled storage appliance, it is recommended that the data be stored uncompressed.
Set as default repository – Check this option to make the repository the default repository.
To create a clone of each virtual machine in a VPG on the recovery site in the production network. The clone is a copy of the
protected virtual machines on the recovery site, while the virtual machines on the protected site remain protected and live.
SELECT A CHECKPOINT button – Opens the Checkpoints Dialog dialog to select the checkpoint to use to make the clone.
Recovery Datastore – Select the datastore to use for the recovery virtual machines.
1. In the Zerto User Interface, click SETTING ( ) in the top right of the header and select Submit Support Ticket.
The Open Support Ticket dialog for the site is displayed.
Remote Log Collection allows customers to authorize Zerto support engineers to collect logs from their environment. By using
remote log collection customers can avoid having to use the Diagnostic Tool on their ZVM server in order to collect logs for
analysis, a potentially complex and time-consuming procedure.
Never: Remote log collection is not allowed (default). If remote log collection is currently is allowed, it will be terminated if you
select this option.
For the next 30 days: Remote log collection is allowed. This permission will automatically terminate in 30 days unless
terminated by selecting the Never option.
Only for a specific case: You will be prompted to enter the Case number opened via the Salesforce Self-service Portal. Remote log
collection will be allowed for as long as the case is active or until remote log collection is terminated by selecting the Never
option.
During installation, information about the site is entered to identify the site in the user interface and to identify the contact
person at the site. After installation you can update this information.
Site Name – The name used to identify the site.
Site Location – Information such as the address of the site or a significant name to identify it.
Contact Name – The name of the person to contact if a need arises.
Contact Email – An email address to use if a need arises.
Contact Phone – A phone number to use if a need arises.
User Name – The administrator name used to access the hypervisor management tool. The name can be entered using either
of the following formats:
■ username
■ domain\username
Password – The password used to access the hypervisor management tool for the given user name. If the password changes,
specify the new password. To ensure security, after saving the settings, the password field is cleared.
Policies Dialog
Failover/Move Commit Policy – The commit policy to use during a failover or move operation. The value set here is the default
for all failover or move operations from this point on but can be changed when defining a failover or move operation. The
following options are available:
■ None – The failover or move operation must be manually committed or rolled back by the user.
■ Commit – After the time specified in the Default Timeout field, the failover or move operation is committed. During the
specified time you can check the recovered VPG virtual machines, and you can manually commit or roll back.
■ Rollback – After the time specified in the Default Timeout field the failover or move operation is rolled back, unless you
manually commit it or roll it back before the time out value is reached. During the specified time you can check the
recovered VPG virtual machines.
Define an email address to receive Zerto Virtual Replication alerts and backup reports.
SMTP Server Address – The SMTP server address. The Zerto Virtual Manager must be able to reach this address.
SMTP Server Port – The SMTP server port, if it was changed from the default, 25.
Sender Account– A valid email address for the email sender name.
To – A valid email address where you want to send the email.
SEND TEST EMAIL button – Tests that the email notification is set up correctly. A test email is sent to the email address
specified in the To field.
Enable sending alerts – Check to be notified by email about any Zerto Virtual Replication alerts issued. An email is sent when
the alert is issued, and after it has been successfully handled and the alert is no longer valid.
Enable backup reports – Defines when backup reports will be emailed.
Reports Dialog
License Dialog
The Zerto license includes information such as the number of virtual machines that can be protected and the license expiry
date.
The cloud and enterprise license include the following details:
License – The license key itself.
License ID – An identifier for the license.
License Type – What is licensed: whether the license restricts the number of virtual machines that can be protected or the
number of sockets used.
Expiry Date – The license expiry date.
Quantity – The maximum number of virtual machines or sockets licensed, based on the license type. If blank, the quantity
is unlimited.
Maximum Sites – The maximum number of sites allowed.
An enterprise license also includes the following:
Usage – The sites using the license and number of protected virtual machines in each site. The number of virtual machines
is independent of whether they are in vApps or not.
About Dialog
The About dialog includes the Zerto Virtual Replication version number and whether to allow analytics to be sent to the
ZertoCall Home server to help improve Zerto Virtual Replication. You can also enable or disable the Zerto Virtual Manager to
send data to the SaaS platform for monitoring purposes.
Send analytics to Zerto – When selected, analytics are sent to Zerto that are used to improve Zerto Virtual Replication and to
automatically update Zerto Virtual Replication when a new version of a hypervisor is released that is supported by Zerto.
Send Data to Cloud – Allows licensed Zerto Virtual Manager users to enable or disable data being sent from the Zerto Virtual
Manager to the SaaS platform thereby enabling site monitoring using the Zerto Mobile App.
Note: The Enable Online Services and Zerto Mobile option is enabled by default.
Notes – A description of the test. For example, defines where external files that describe the tests are saved. Notes are limited
to 255 characters.
Stop button – Stops the testing. After stopping a test, the virtual machines in the recovery site are powered off and then
removed, and the checkpoint that was used for the test has the following tag added to identify the test:
Tested at startDateAndTimeOfTest.
TASKS
Monitor the recent tasks by clicking the TASKS area in the status bar at the bottom of the Zerto User Interface. The following
information is displayed for the most recent tasks:
■ The task status.
■ The name of the task.
■ A description of the task.
Also, actions, such as stopping a failover test, can be performed from this dialog.
Click See All Tasks to access MONITORING > TASKS.
For more details, see “Edit VM Dialog”, on page 213.
TASKS 232
CHAPTER 22: GLOSSARY
Access Key (AWS) An alphanumeric text string that uniquely identifies the AWS account owner. No two accounts can
have the same AWS Access Key.
Amazon Web Services A collection of remote computing services, also called web services, that make up a cloud computing
(AWS) platform by Amazon.com. The most central and well-known of these services are Amazon EC2 and
Amazon S3. The service is advertised as providing a large computing capacity (potentially many
servers) much faster and cheaper than building a physical server farm.
Asynch Replication See Replication, Asynchronous.
Backup See Extended Recovery.
Bare Metal A computer system or network in which a virtual machine is installed directly on hardware rather than
within the host operating system (OS).
Bitmap Sync1 A change tracking mechanism of the protected machines during a disconnected state when Zerto
Virtual Replication starts to maintain a smart bitmap in memory to track and record changed storage
areas. Since the bitmap is kept in memory, Zerto Virtual Replication does not require any LUN or
volume per VPG at the source side.
The bitmap is small and scales dynamically, containing references to the areas of the source disk that
have changed but not the actual I/O. The bitmap is stored locally on the VRA within the available
resources. For example, when a VRA goes down and is then rebooted.
When required, Zerto Virtual Replication starts to maintain a smart bitmap in memory, to track and
record storage areas that change. When the issue that caused the bitmap sync is resolved, the bitmap
is used to check updates to the source disks and send any updates to the recovery site. A bitmap sync
occurs during the following conditions:
■ Synchronization after WAN failure or when the load over the WAN is too great for the WAN to
handle, in which case the VPGs with the lower priorities will be the first to enter a Bitmap Sync.
■ When there is storage congestion at the recovery site, for example when the VRA at the recovery
site cannot handle all the writes received from the protected site in a timely fashion.
■ When the VRA at the recovery site goes down and is then rebooted.
During the synchronization, new checkpoints are not added to the journal but recovery operations are
still possible. If a disaster occurs requiring a failover during a bitmap synchronization, you can recover
to the last checkpoint written to the journal.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Bucket (AWS) Amazon buckets are like a container for your files. You can name your buckets the way you like but it
should be unique across the Amazon system.
Business Continuity & An organization’s ability to recover from a disaster and/or unexpected event and resume or continue
Disaster Recovery operations. A disaster recovery, DR, plan is a subset of a Business Continuity plan. Organizations
(BC/DR) should have a business continuity, BC, plan in place that outlines the logistics and business operations.
The key metrics to be measured in a disaster recovery environment are the Recovery Point Objective
(RPO) and Recovery Time Objective (RTO).
Business Continuity Holistic management process that identifies potential threats to an organization and the impacts to
Management (BCM) business operations that those threats, if realized, might cause, and which provides a framework for
building organizational resilience with the capability for an effective response that safeguards the
interests of its key stakeholders, reputation, brand and value-creating activities. (ISO 22313, formerly
BS 25999-1).
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary 233
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
Business Continuity Contains the instructions, procedures and guidelines that are developed and maintained in readiness
Plan for use during and after any potentially disruptive event in order to enable the organization to continue
to deliver its critical activities at an acceptable, predefined level.
Business Impact The process of analyzing business functions and processes and the effects that a business disruption
Analysis (BIA) might have upon them.
Checkpoint Zerto Virtual Replication ensures crash consistency by writing checkpoints to the journal every few
seconds. These checkpoints ensure write order fidelity and crash-consistency to each checkpoint.
During recovery you pick one of these crash-consistent checkpoints and recover to this point.
Additionally, checkpoints can be manually added by the administrator, with a description of the
checkpoint. For example, when an event is going to take place that might result in the need to perform
a recovery, you can pinpoint when this event occurs as a checkpoint in each journal.
Cloud Service Provider A service provider that offers customers storage or software services available via a private (private
(CSP) cloud) or public network (cloud). Usually, it means the storage and software is available for access via
the Internet. Typically Infrastructure as a Service (IaaS), Software as a Service (SaaS), or Platform as a
Service (PaaS) – are offered to their customers. Zerto enables them to offer Disaster Recovery As A
Service (DRaaS) and In-Cloud DR (ICDR), too.
Crisis Management Provides the overall coordination of the organization’s response to a crisis (which is a critical event
Plan that needs to be handled appropriately to prevent a damaging impact to the organization’s
profitability, reputation or ability to operate).
Data Deduplication A specialized data compression technique for eliminating duplicate copies of repeating data.
Delta Sync 1 The Delta Sync uses a checksum comparison to minimize the use of network resources. A Delta Sync
is used when the protected virtual machine disks and the recovery disks should already be
synchronized, except for a possible few changes to the protected disks, for example, when the target
recovery disk is defined as a preseeded (not available in the cloud) disk or after a VRA upgrade, or for
reverse protection after a move or failover.
During the synchronization, new checkpoints are not added to the journal but recovery operations are
still possible. If a disaster occurs requiring a failover during a delta synchronization, you can recover to
the last checkpoint written to the journal.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Disaster The occurrence of one or more events which, either separately or cumulatively, activate disaster
recovery.
Disaster Recovery The ability to restart operations after an interruption to the business according to a plan that ensures
an orderly and timely restoration.
Disaster Recovery Plan The disaster recovery, DR, plan is a component of the Business Continuity plan that details the
process and procedures to recover the organization’s resources to continue business operations. The
Technology DR plan focuses on the IT disaster recovery. Also see Business Continuity Plan.
Disaster Recovery As A disaster recovery solution that incorporates a service provider to replace or augment the
A Service (DRaaS) organization’s data protection implementation. In a DRaaS scenario, the customer may manage and
have complete control over the production data. The Cloud Service Provider (CSP) may provide a
partial or completely managed service. In either case, the CSP must ensure the availability of the data
and adapt as the customers infrastructure changes. An advantage of this model is the CSP has
dedicated resources skilled in DR operations.
DRS (vSphere) Enables balancing computing workloads with available resources in a VMware vCenter cluster.
Emergency Covers the immediate response to a situation or set of circumstances that present a clear and present
Management threat to the safety of personnel or other assets of the organization.
Estimated Recovery This is the estimated timings based on full resource provision available during a live invocation. This
Time (ERT) time typically sits between the Net Recovery Time and the Recovery Time Achieved (RTA) time.
234
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
ESX/ESXi (vSphere) Bare-metal hypervisor from VMware, meaning it installs directly on top of the physical server and
partitions it into multiple virtual machines that can run simultaneously, sharing the physical resources
of the underlying server. ESXi is the most recent version.
Extended Recovery Extended DR includes the ability to configure both disaster recovery and offsite backups for the
protected virtual machines in the VPG, according to a user-defined data retention policy.
High Availability VMware high availability decreases downtime and improves reliability with business continuity by
(VMHA) enabling another ESX/ESXi host to start up virtual machines that were running on another ESX/ESXi
host that went down. High availability is automatically disabled by Zerto Virtual Replication while
updating recovered virtual machines in the recovery site from the VRA journal. After the promotion of
the data from the journal to the virtual machine completes, high availability is automatically re-
enabled. The HA configuration can include admission control to prevent virtual machines being
started if they violate availability constraints. If this is the case, then a failover, test failover or
migration of the virtual machines in a VPG to the cluster with this configuration will fail, if the
availability constraints are violated when the virtual machines are recovered.
Hyper-V A hybrid hypervisor, which is installed in the operating system. However, during installation it
redesigns the operating system architecture and becomes just like a next layer on the physical
hardware.
Hypervisor The host for multiple VMs in a virtualized environment. vSphere, ESX/ESXi, is the VMware brand
hypervisor. The hypervisor is the virtualization architecture layer that allows multiple operating
systems, termed guests, to run concurrently on a host computer.
Hypervisor Manager The tool used to manage the host. For example VMware vCenter Server and Microsoft SCVMM.
I/O (Input/Output) Describes any operation, program, or device that transfers data to or from a computer. Typical I/O
devices are printers, hard disks, keyboards, and mouses. In fact, some devices are basically input-only
devices (keyboards and mouses); others are primarily output-only devices (printers); and others
provide both input and output of data (hard disks, diskettes, writable CD-ROMs). In computer
architecture, the combination of the CPU and main memory (memory that the CPU can read and write
to directly, with individual instructions) is considered the brain of a computer, and from that point of
view any transfer of information from or to that combination, for example to or from a disk drive, is
considered I/O.
In-Cloud DR (ICDR) A disaster recovery solution that incorporates a service provider to replace or augment the
organization’s data protection implementation. When customers leverage an ICDR service, the CSP
hosts the production and DR sites. The virtual machines (VMs) are typically replicated from one CSP
datacenter to another CSP datacenter as a managed service or as managed co-located datacenters.
The customers have the ability to interact with their applications as if they were locally hosted.
Initial Sync1 Synchronization performed after creating the VPG to ensure that the protected disks and recovery
disks are the same. Recovery operations cannot occur until after the initial synchronization has
completed.
Adding a virtual machine to a VPG is equivalent to creating a new VPG and an initial synchronization
is performed. In this case, any checkpoints in the journal become unusable and only new checkpoints
added after the initial synchronization completes can be used in a recovery. The data in the journal
however remains and is promoted to the recovered virtual machine as part of a recovery procedure.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
iSCSI An Internet Protocol (IP)-based storage networking standard for linking data storage facilities. By
carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and
to manage storage over long distances.
235
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
Journal Every write to a protected virtual machine is intercepted by Zerto Virtual Replication and a copy of the
write is sent, asynchronously, to the recovery site, while the write continues to be processed on the
protected site. On the recovery site the write is written to a journal managed by the Virtual Replication
Appliance. Each protected virtual machine has its own journal.
Each journal can expand to a size specified in the VPG definition and automatically shrinks when the
expanded size is not needed.
LUN Disk drives are the foundation of data storage, but operating systems cannot use physical disk storage
directly. The platters, heads, tracks and sectors of a physical disk drive must be translated into a
logical space, which an OS sees as a linear address space comprised of fixed-size blocks. This
translation creates a logical entity that allows operating systems to read/write files. Storage networks
must also partition their physical disks into logical entities so that host servers can access storage
area network (SAN) storage. Each logical portion is called a logical unit number (LUN). A LUN is a
logical entity that converts raw physical disk space into logical storage space, which a host server's OS
can access and use. Any computer user recognizes the logical drive letter that has been carved out of
their disk drive. For example, a computer may boot from the C: drive and access file data from a
different D: drive. LUNs do the same basic job.
Level of Business The reduced level of service that has been agreed if there is an interruption to business operations.
Continuity
Managed Service See Cloud Service Provider (CSP).
Provider (MSP)
Maximum Tolerable The maximum tolerable data loss an organization can endure without compromising its business
Data Loss objectives.
Maximum Tolerable The maximum time after which an outage will compromise the ability of the organization to achieve
Outage (MTO) its business objectives.
Maximum Tolerable The duration after which an organization's viability will be irrevocably threatened if product and
Period of Disruption service delivery cannot be resumed.
NAS A network-attached storage (NAS) device is a server that is dedicated to nothing more than file
sharing. NAS does not provide any of the activities that a server in a server-centric system typically
provides, such as e-mail, authentication or file management. NAS allows more hard disk storage
space to be added to a network that already utilizes servers without shutting them down for
maintenance and upgrades. With a NAS device, storage is not an integral part of the server. Instead, in
this storage-centric design, the server still handles all of the processing of data but a NAS device
delivers the data to the user. A NAS device does not need to be located within the server but can exist
anywhere in a LAN and can be made up of multiple networked NAS devices.
Net Recovery Time The net time achieved in recovering one or more VPGs after a disaster.
Offsite Backup See Extended Recovery.
Operational Level The agreement between the service management and the Service Provision Partners. It defines the
Agreement (OLA) responsibilities for support and delivery of the services provided.
Pair Zerto Virtual Replication can be installed at one or more sites and each of these sites can connect to
any of the other sites enabling enterprises to protect virtual machines across multiple vCenters or
within the same vCenter. Two sites connected to each other are considered paired. Also see
Replication to Self.
Preseed A virtual disk (a. vmdk flat file and descriptor or a .vhdx file) in the recovery site that has been
prepared with a copy of the protected data. Using this option is recommended particularly for large
disks so that the initial synchronization is much faster. When not using a preseeded disk the initial
synchronization phase has to copy the whole disk over the WAN. Zerto Virtual Replication takes
ownership of the preseeded disk, moving it from its source folder to the folder used by the VRA.
Note that preseeding is not available in the cloud.
236
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
Quiesce Pausing or altering the state of running processes on a computer, particularly those that might modify
information stored on disk during a backup, in order to guarantee a consistent and usable backup.
Critical applications, such as databases have quiescent mechanisms that Zerto Virtual Replication can
use to get application consistent checkpoints.
RBAC Role-based Access control, available in the Zerto Cloud Manager via the Permissions tab.
RDM (vSphere) RDM is a mapping file in a separate VMFS volume that acts as a proxy for a raw physical storage
device. The RDM allows a virtual machine to directly access and use the storage device. The RDM
contains metadata for managing and redirecting disk access to the physical device.
The file gives you some of the advantages of direct access to a physical device while keeping some
advantages of a virtual disk in VMFS. As a result, it merges VMFS manageability with raw device
access.
Zerto Virtual Replication supports both physical and virtual mode RDMs.
Recovery Point The maximum amount of data that may be lost when the activity or service is restored after an
Objective (RPO) interruption. Expressed as a length of time before the interruption.
Recovery Time The actual times achieved during a DR test.
Achieved (RTA)
Recovery Time Related to downtime. The metric refers to the amount of time it takes to recover from a data loss
Objective (RTO) event and how long it takes to return to service. The metric is an indication of the amount of time the
system's data is unavailable or inaccessible, thus preventing normal service.
Replication, Technique for replicating data between databases or file systems where the system being replicated
Asynchronous does not wait for the data to have been recorded on the duplicate system before proceeding.
Asynchronous Replication has the advantage of speed, at the increased risk of data loss during due to
communication or duplicate system failure.
Replication to Self When a single vCenter is used, for example with remote branch offices, when replicating from one
datacenter to another datacenter, both managed by the same vCenter Server, you have to enable
replication to the same vCenter Server and pairing is not required.
Resource The elements (such as staff, site, data, IT systems) that are required to deliver an activity or service.
Resource Recovery Contains the instructions, procedures and guidelines to recover one or more resources and return
Plan conditions to a level of operation that is acceptable to the organization. Recovery Plans include
detailed recovery procedures for IT equipment and infrastructure.
Rolling Back Rolling back to an initial status, for example, after canceling a cloning operation on the VPG.
RPO See Recovery Point Objective (RPO).
RTO See Recovery Time Objective (RTO).
SAN A storage area network (SAN) is any high-performance network whose primary purpose is to enable
storage devices to communicate with computer systems and with each other. A storage device is a
machine that contains nothing but a disk or disks for storing data. A SAN's architecture works in a way
that makes all storage devices available to all servers on a LAN or WAN. As more storage devices are
added to a SAN, they too will be accessible from any server in the larger network. In this case, the
server merely acts as a pathway between the end user and the stored data. Because stored data does
not reside directly on any of a network's servers, server power is utilized for business applications, and
network capacity is released to the end user.
SCSI Acronym for Small Computer System Interface. SCSI is a parallel interface standard used by many
servers for attaching peripheral devices to computers. SCSI interfaces provide for faster data
transmission rates (up to 80 megabytes per second) than standard serial and parallel ports. In
addition, you can attach many devices to a single SCSI port, so that SCSI is really an I/O bus rather
than simply an interface.
SCVMM A Microsoft management solution for the virtualized datacenter, enabling you to configure and
manage your virtualization host, networking, and storage resources in order to create and deploy
virtual machines and services to private clouds that you have created.
237
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
Secret Access Key A password. The Secret Access Key with the Access Key forms a secure information set that confirms
(AWS) the user's identity.
Security Group A virtual firewall that controls the traffic for one or more instances.
Service Continuity The continuity plan that acts as an umbrella document for a service, referencing other plans as
Plan required and providing service-specific emergency management and recovery plans.
Service Level The agreement between the customer and service provider which defines the service that is to be
Agreement (SLA) delivered to the customer.
Service Profile A predefined set of default properties to use when VPGs are defined or edited. Zerto provides a
default service profile and the option for the organization to specify their own requirements. The cloud
service provider can define service profiles to manage specific service level agreements (SLAs) with
its customers.
Service Test Plan Detailed plan defining the activities required to test the recovery of an individual IT service to meet
business requirements documented in the RTO and RPO.
Shadow VRA During normal operation, a VRA might require more disks than a single virtual machine can support. If
this situation arises, the VRA creates new shadow VRA virtual machines, used by the VRA to maintain
additional disks. These virtual machines must not be removed. A VRA can manage a maximum of
1500 volumes, whether these are volumes being protected or recovered.
Snapshots A snapshot is a block device which presents an exact copy of a logical volume, frozen at some point in
time. Typically this would be used when some batch processing, a backup for instance, needs to be
performed on the logical volume, but you don't want to halt a live system that is changing the data.
Zerto does NOT use a snapshot mechanism, but is constantly replicating data writes.
Storage Account Storage accounts are like a container for your files. You can name your storage account the way you
(Azure) like but it should be unique across the Azure system.
Subnet A logical, visible subdivision of an IP network.[1] The practice of dividing a network into two or more
networks is called subnetting.
Subscription (Azure) The description uses information derived from the following site:
https://blogs.msdn.microsoft.com/arunrakwal/2012/04/09/create-windows-azure-subscription/
An Azure subscription grants access to Azure services and Platform Management Portal. A
subscription has two aspects:
■ The Windows Azure account, through which resource usage is reported and services are billed.
■ The subscription itself, which governs access to and use of the Azure services that are subscribed
to.
System Center Virtual See SCVMM.
Machine Manager
Virtual Machine (VM) A virtual machine (VM) is an environment, usually a program or operating system, which does not
physically exist but is created within another environment. In this context, a VM is called a guest while
the environment it runs within is called a host.
Virtual Network A virtual network dedicated to an Azure subscription.
(VNet) (Azure)
Virtual Private Cloud An on demand configurable pool of shared computing resources allocated within a public cloud
(VPC) (AWS) environment, providing a certain level of isolation between the different organizations (denoted as
users hereafter) using the resources. The isolation between one VPC user and all other users of the
same cloud (other VPC users as well as other public cloud users) is achieved normally through
allocation of a Private IP Subnet and a virtual communication construct (such as a VLAN or a set of
encrypted communication channels) per user.
Virtual Protection See VPG.
Group
Virtual Replication See VRA.
Appliance
238
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
VMDK, Virtual Virtual Machines created with VMware products typically use virtual disks. The virtual disks, stored
Machine Disk as files on the host computer or remote storage device, appear to the guest operating systems as
standard disk drives.
Volume Delta Sync1 Synchronization when only delta changes for a volume needs synchronizing, for example, when a
virtual machine is added to a VPG using a preseeded disk.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Delta Sync.
For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Preseeding is not available in the cloud.
Volume Full Sync1 Synchronization when a full synchronization is required on a single volume.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Full Sync.
Note: For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
Volume Initial Sync1 Synchronization when a full synchronization is required on a single volume, for example, when
changing the target datastore or adding a virtual machine to the VPG without using a preseeded (not
available in the cloud) disk.
During the synchronization, new checkpoints are not added to the journal. Also, recovery operations
are not possible during a Volume Initial Sync.
For the synchronization to work, the protected virtual machines must be powered on. The VRA
requires an active IO stack to access the virtual machine data to be synchronized across the sites. If
the virtual machine is not powered on, there is no IO stack to use to access the source data to
replicate to the target recovery disks.
VPG Virtual machines are protected in virtual protection groups. A virtual protection groups (VPG) is a
group of virtual machines that you want to group together for replication purposes. For example, the
virtual machines that comprise an application like Microsoft Exchange, where one virtual machine is
used for the software, one for the database and a third for the Web Server, require that all three virtual
machines are replicated to maintain data integrity.
VRA A virtual machine installed on each hypervisor hosting virtual machines to be protected or recovered,
that manages the replication of protected virtual machine writes across sites. A VRA must be installed
on every hypervisor that hosts virtual machines that require protecting in the protected site and on
every hypervisor that will host the replicated virtual machines in the recovery site.
vSphere VMware’s server virtualization platform for building a cloud infrastructure.
Zerto Cloud Connector A virtual machine installed on the cloud side, one for each customer organization replication network.
(ZCC) The Zerto Cloud Connector requires both cloud-facing and customer-facing static IP addresses. The
ZCC routes traffic between the customer network and the cloud replication network, in a secure
manner ensuring complete separation between the customer network and the cloud service provider
network. The ZCC has two Ethernet interfaces, one to the customer’s network and one to the cloud
service provider's network. Within the cloud connector a bidirectional connection is created between
the customer and cloud service provider networks. Thus, all network traffic passes through the ZCC,
where the incoming traffic on the customer network is automatically configured to IP addresses of the
cloud service provider network.
239
Zerto Virtual Manager Administration Guide for Microsoft Azure Environments - Version 5.5 Update 3
Glossary
Zerto Cloud Manager A Windows service, which enables managing all the cloud sites offering disaster recovery using a
(ZCM) single interface. The ZCM manages the DR either as a service (DRaaS) or completely within the cloud
environment, protecting on one cloud site and recovering to a second site (ICDR).
Zerto User Interface Recovery using Zerto Virtual Replication is managed via a user interface: in a browser via the Zerto
Virtual Manager Web Client, or in either the vSphere Web Client or vSphere Client console in the
Zerto tab.
Zerto Self-service An out-of-the-box DR portal solution with a fully functioning browser-based service portal to enable
Portal (ZSSP) cloud service providers to quickly introduce disaster recovery as part of their portal offering.
Zerto Virtual Backup A Zerto Virtual Replication service that manages the offsite backup.
Appliance (VBA)
Zerto Virtual Manager A Windows service, which manages everything required for the replication between the protection
(ZVM) and recovery sites, except for the actual replication of data. The ZVM interacts with the vCenter
Server to get the inventory of VMs, disks, networks, hosts, etc. The ZVM also monitors changes in the
VMware environment and responds accordingly. For example, a vMotion operation of a protected VM
from one host to another is intercepted by the ZVM so the Zerto User Interface is updated
accordingly.
ZORG, Zerto Cloud customers are defined to Zerto Cloud Manager as Zerto organizations, ZORGs. A ZORG is
Organization defined with the cloud resources it can use, the permissions that it has to perform operations, such as
testing a failover or defining a VPG.
1. Synchronization after a recovery starts after the promotion of data from the journal to the virtual machine disks ends. Thus, synchronization of virtual ma-
chines can start at different times, dependent on when the promotion for the virtual machine ends. All synchronizations are done in parallel, whether a delta
sync or full sync, etc.
240
INDEX
241
F journal history ................................................................................ 70
failback ........................................................................................... 166
after failover ..........................................................................167 K
enable after failover ..........................................134, 142, 169 Keep Source VMs ............................................................... 132, 137
failover ..........................................................................147–154, 166
commit policy ...............................................................119, 227
L
description ............................................................................ 147
license ............................................................................................. 122
during a test .......................................................................... 154
updating ................................................................................. 122
failback .................................................................134, 142, 169
Linux machines
generating alerts ...................................................................152
file and folder recovery .......................................................158
initiating ............................................................... 141, 148, 168
logs
initiating during a test ........................................................ 154
collecting .........................................................................190–??
overview ................................................................................. 114
collecting when Zerto Virtual Manager is down .........192
process ................................................................................... 166
logs, collecting .....................................................................189–193
stopping a test ......................................................................128
logs, understanding .....................................................................194
testing .................................................................................... 124
topology .......................................................135, 143, 151, 170
failover test M
in a sandbox .......................................................................... 130 MAC address .................................................................................. 61
overview ..................................................................................112 Microsoft SQL Server DB
file recovery ...................................................................................158 reconfiguring ......................................................................... 110
Linux machines .....................................................................158 migration, see move
Firefox ................................................................................................ 15 monitor
folder recovery ..............................................................................158 alerts, events, and running tasks ...............................65, 70
Linux machines .....................................................................158 recent tasks .......................................................................... 232
force delete ..................................................................................... 99 monitoring
VPG ........................................................................................... 86 one VPG .................................................................................. 69
full synchronization ...................................................................... 101 sites ...........................................................................................76
for volumes ............................................................................ 101 virtual machines .................................................................... 74
VPGs tab ..................................................................................65
move .................................................................... 132–137, 144, 170
G
commit policy ..............................................................119, 227
geometry, non-default ........................................................ 39, 219
definition ................................................................................ 132
glossary ............................................................................... 233–240
description ............................................................................ 140
generating alerts ..................................................................136
H initiating .................................................................................. 133
HTTPS ............................................................................................... 15 overview ..................................................................................113
using a scratch volume ............................................. 144, 170
I
initial synchronization ..........................................21, 24, 102, 211 N
instance family NAT rules ........................................................................................ 60
choosing ................................................................................. 119 needs configuration .....................................................................102
instance size troubleshooting ....................................................................188
choosing ......................................................127, 133, 137, 152 network
instance type for failing over or moving ............................................ 40, 50
choosing ........................................................................ 119, 147 for testing ........................................................................ 40, 50
Internet Explorer, supported versions ....................................... 15 NTP clock synchronization ....................................................... 223
J O
journal ............................................................. 47, 56, 85, 198, 199 offsite backup ................................................................... 12, 20, 26
adding a checkpoint .............................................................. 87 configuring .............................................................................174
defining its storage ...............................................................49 enabling compression ........................................................ 223
defining save time ............................................................... 198 flow ........................................................................................... 20
description .............................................................................. 24 monitoring ...............................................................................77
storage ..............................................................................36, 47 repository ......................................................................174, 176
242
restoring ..................................................................................20 Recovery .................................................................................178
retention period ......................................................20, 26, 82 recovery operations (test, failover, move) ....................178
running ..................................................................................... 86 Resources ...............................................................................180
running unscheduled ............................................................ 86 Resources report ..................................................................180
setting up ............................................................................... 174 VPG Performance ................................................................184
status in Dashboard ......................................................67, 75 repository
status in single VPG tab ...................................................... 70 defining new ......................................................................... 222
status in VPGs tab ........................................................ 67, 68 offsite backup ..............................................................174, 176
storing ...................................................................................... 26 Resources report ..........................................................................180
offsite backup repository configuring ............................................................................ 229
editing .....................................................................................176 generating with REST API ...................................................181
Offsite Backups report ................................................................185 output .....................................................................................182
Outbound Protection Over Time report .................................178 Resources report, configure .......................................................121
restore
P offsite backup ........................................................................ 20
pairing ....................................................................................110, 209 retention period
pause protection ............................................................................84 offsite backup .................................................................20, 26
performance graphs ..................................................................... 65 reverse protection, see failback
for a single VPG ..................................................................... 69 rollback
policies failover ...........................................................................147, 152
configuring ............................................................................. 119 move ........................................................................................136
PowerShell cmdlet setting for failover or move ................................................119
Set-Checkpoint ...................................................................... 87 running tasks, see tasks
preseed ................................................................... 39, 50, 218, 219
recovery volume .............................................................39, 59 S
preseeding ....................................................................................... 86 sandbox ..........................................................................................130
promotion of data ................................................................ 144, 171 scheduling checkpoints ................................................................ 91
protection scratch volume ................................................................... 144, 170
pause ........................................................................................ 85 scripts
resume ..................................................................................... 85 creating .....................................................................................95
provisioned storage ...............................................................67, 75 examples ..................................................................................97
running ..................................................................................... 94
R ZertoForce environment variable ......................................95
raw disk (RDM) ............................................................................218 ZertoOperation environment variable ............................ 94
recovery ................................................................................ 147, 166 ZertoVCenterPort environment variable .........................95
during a test .......................................................................... 154 ZertoVPGName environment variable ........................... 94
initiating ............................................................... 141, 148, 168 security certificate
to Hyper-V ..............................................................................44 adding ....................................................................................... 15
to VMware vCenter Server ................................................. 32 Set-Checkpoint cmdlet .................................................................87
to VMware vCloud Director ............................................... 53 settings
types .......................................................................................... 19 importing VPG ....................................................................... 98
recovery host, changing ............................................................ 206 settings, for a site .................................................................117–122
Recovery report ............................................................................178 shadow VRA ................................................................................. 238
branding ................................................................................. 180 signature matching, WAN optimization .................................. 14
recovery site, pairing ................................................................... 110 site details
recovery volume monitoring .............................................................................. 64
preseeding ........................................................................39, 59 site settings .................................................................................. 226
swap ..................................................................................39, 59 commit policy ..............................................................119, 227
registration .....................................................................................122 defining ....................................................................................117
re-IP .....................................................................................42, 52, 61 email ........................................................................................120
vNIC configuration ................................................................ 42 recovery policies ...................................................................119
Replication Pause Time ........................................................85, 119 Resources report ...................................................................121
reports ................................................................................... 178–186 Sites tab ............................................................................................76
Offsite Backups .....................................................................185 sizing
Outbound Protection Over Time .....................................178 volumes ...................................................................39, 49, 218
243
SLA information .............................................................................. 21 V
status v
VPG ................................................................................... 98, 99 vApp network mapping ............................................................... 60
storage VBA ..................................................................................................174
for replicated data .................................................................49 vCD guest customizing ................................................................ 60
provisioned ......................................................................67, 75 VIB ............................................................................. 205, 208, 220
sizing .........................................................................................49 Virtual Backup Appliance, see VBA
storage profile ....................................................................... 57, 183 virtual machine
for vCD ..................................................................................... 59 modifying replication settings .......................................... 213
stored offsite backup .................................................................... 26 monitoring .............................................................................. 74
summary tab ...................................................................................64 virtual protection group, see VPG
swap disk .........................................................................................50 Virtual Replication Appliance, see VRA
recovery volume .............................................................39, 59 VM in Several VPGs .......................................................11, 82, 132
synchronization vNIC
bitmap .................................................................................... 100 configuring ............................................................................... 61
delta ..........................................................................................50 configuring re-IP .....................................................................52
delta sync .............................................................................. 100 vNIC configuration
delta sync for volumes ........................................................ 101 re-IP .......................................................................................... 42
forcing ...................................................................................... 85 volume
full ............................................................................................. 101 estimating size .......................................................39, 49, 218
initial ................................................................. 21, 24, 59, 102 full synchronization ............................................................. 101
length of time ......................................................................... 25 preseed ............................................................................. 39, 59
status ...................................................................................... 102 Volume Shadow Copy Service, see VSS
taking a long time ................................................................ 188 VPG .................................................................................................... 19
synchronization triggers add a virtual machine ........................................................... 82
VPG ..................................................................................98, 103 configuring ............................................................................... 21
creating to vCenter Server ........................................... 32, 43
T definition ............................................................................19, 21
tasks .................................................................................................. 72 deleting .....................................................................................85
in Dashboard .......................................................................... 65 editing ..................................................................................... 215
in single VPG tab ................................................................... 70 force delete ............................................................................. 99
monitoring .............................................................................232 importing settings ................................................................. 98
test failover ................................................................................... 124 modifying ................................................................................. 81
description ............................................................................ 124 monitoring ...............................................................................65
overview ..................................................................................112 monitoring one ...................................................................... 69
stopping ..................................................................................128 pausing protection ................................................................ 84
thin provisioning ............................................................................ 59 saving details to a file .......................................................... 69
throttling ...........................................................................................14 synchronization triggers ............................................ 98, 103
topology synchronizing ..........................................................................85
for failover ...................................................135, 143, 151, 170 testing failover ......................................................................124
transaction consistency topology ................................................................................... 71
VSS ............................................................................................ 89 waiting to be removed ......................................................... 86
triggers VPG Performance report ............................................................184
synchronization ..................................................................... 98 VPG status
VPG synchronization .......................................................... 103 VPG waiting to be removed ........................................86, 99
troubleshooting ................................................................... 187–194 VPG statuses ...........................................................................98, 99
collecting logs ...................................................................... 189 VPGs tab
collecting logs when Zerto Virtual Manager is down .192 monitoring ...............................................................................65
Needs Configuration .......................................................... 188 VRA ...................................................................................12, 19, 238
using the Diagnostics utility ............................................. 188 changing recovery host .....................................................206
VPG syncing ......................................................................... 188 troubleshooting ....................................................................188
VRA problems ...................................................................... 188 VSS ................................................................................... 87, 89, 160
Zerto Virtual Manager service .........................................187 crash consistency ................................................................. 89
setting COM permissions ....................................................93
transaction consistency ...................................................... 89
244
W
WAN
signature matching ................................................................14
WAN bandwidth, freeing up ......................................................84
WAN optimization .........................................................................14
Windows service
Zerto Virtual Manager ........................................................187
ZertoVssprovider ..................................................................90
Z
Zerto Cloud Appliance .................................................................. 15
Zerto User Interface
accessing .................................................................................. 15
configuration ........................................................................... 17
customizing ............................................................................. 18
description ............................................................................... 17
Zerto Virtual Manager ..................................................................10
checking component connectivity .................................. 104
managing ............................................................................... 104
reconfiguring ........................................................................ 105
Windows service ..................................................................187
Zerto Virtual Replication
architecture .............................................................................10
benefits ..................................................................................... 12
description ...............................................................................10
logs .......................................................................................... 194
version information ..............................................................123
ZertoForce script ........................................................................... 95
ZertoOperation script ..................................................................94
ZertoVCenterPort script .............................................................. 95
ZertoVPGName script .................................................................94
ZertoVssAgent
installing .................................................................................. 89
ZertoVssAgent.exe ........................................................................ 91
ZertoVssAgentGUI.exe.conf .............................................. 90, 94
ZertoVssprovider
Windows service ...................................................................90
ZORG
preseeding ............................................................................... 59
ZVM, see Zerto Virtual Manager
Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing scalable business continuity For further assistance
software solutions. Through the Zerto Cloud Continuity Platform, organizations seamlessly move and protect using Zerto Virtual
virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual Replication, contact
Replication, is the standard for protection of applications in cloud and virtualized datacenters. @Zerto Support.