Book Image

Mastering Veeam Backup & Replication 10

By : Chris Childerhose
Book Image

Mastering Veeam Backup & Replication 10

By: Chris Childerhose

Overview of this book

Veeam is one of the leading modern data protection solutions, and mastering this technology can help you to protect your virtual environments effectively. This book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam. You will even gain in-depth knowledge of advanced concepts such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE. This book starts by taking you through Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication. You'll get to grips with the 3-2-1 rule to safeguard data along with understanding how to set up a backup server, proxies, repositories, and more. Later chapters go on to cover a powerful feature of Veeam 10 – NAS backup. As you progress, you'll learn about scale-out Repositories and best practices for creating them. In the concluding chapters, you'll explore the new proxy option available in both Linux and Windows. Finally, you'll discover advanced topics such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE. By the end of this book, you will be equipped with the skills you need to implement Veeam Backup & Replication for your environment and disaster recovery.
Table of Contents (15 chapters)
1
Section 1: Installation – Best Practices and Optimizations
4
Section 2: Storage – NAS Backup, Linux, SOBR, and OBS
9
Section 3: DataLabs, Cloud Backup, and Veeam ONE

Other Books You May Enjoy

If you enjoyed this book, you may be interested in these other books by Packt:

Mastering Azure Security

Mustafa Toroman, Tom Janetscheck

ISBN: 978-1-83921-899-6

  • Understand cloud security concepts
  • Get to grips with managing cloud identities
  • Adopt the Azure security cloud infrastructure
  • Grasp Azure network security concepts
  • Discover how to keep cloud resources secure
  • Implement cloud governance with security policies and rules

AWS Security Cookbook

Heartin Kanikathottu

ISBN: 978-1-83882-625-3

  • Create and manage users, groups, roles, and policies across accounts
  • Use AWS Managed Services for logging, monitoring, and auditing
  • Check compliance with AWS Managed Services that use machine learning
  • Provide security and availability for EC2 instances and applications
  • Secure data using symmetric and asymmetric encryption
  • Manage user pools and identity pools with federated login
...