Book Image

Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager - Second Edition

By : Abhilash G B
Book Image

Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager - Second Edition

By: Abhilash G B

Overview of this book

VMware vCenter Site Recovery manage is an orchestration tool used to automate disaster recovery in a manner that no other solution does. It is programmed to leverage array-based replication and VMware's proprietary vSphere Replication engine. The book begins by talking about the architecture of SRM and guides you through the procedures involved in installing and configuring SRM to leverage array-based replication. You will then learn how to protect your virtual machines by creating Protection Groups and validate their recoverability by testing recovery plans and even performing failover and failback. Moving on, you will learn how to install and configure vSphere Replication as a standalone disaster recovery solution. It also guides you through the procedures involved in configuring SRM to leverage vSphere replication. Finally, you will learn how to deploy and configure vRealize Orchestrator and its plugin for SRM and vSphere Replication.
Table of Contents (13 chapters)
Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager Second Edition
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface
Index

Chapter 2. Creating Protection Groups and Recovery Plans

In the previous chapter, you learned how to install SRM, configure it, and lay the foundation for an SRM protected environment. You learned how to create resource, folder, and network mappings, as well as configure placeholder datastores and array managers. In this chapter, you will learn how to create protection groups and recovery plans.

In this chapter, we will cover the following topics:

  • Understanding datastore groups

  • Understanding protection groups

  • Understanding recovery plans

Once you have done the groundwork required to form an SRM protected environment, the next step is to enable protection on the virtual machines (VMs). Before we delve into the procedural steps involved in protecting VMs, it is very important to understand a couple of basic concepts, such as the datastore and protection groups.