Veritas™ Resiliency Platform 2.2 Solutions for Microsoft Hyper-V
- Section I. Overview of Resiliency Platform
- Section II. Preparing your environment
- Using array-based replication
- Managing disaster recovery network mapping
- Using array-based replication
- Section III. Working with resiliency groups
- Managing resiliency groups
- Configuring resiliency groups for remote recovery
- Managing virtual machines for remote recovery (DR) using 3rd party replication technology
- Managing virtual machines for remote recovery (DR) in Amazon Web Services
- Section IV. Managing disaster recovery
- Managing resiliency plans
- Creating a new resiliency plan template
- Monitoring risks, reports, and activites
- Managing evacuation plans
- Appendix A. General troubleshooting
- Appendix B. Sample policy and trust relationships for AWS
Events in Hyper-V virtual machines disaster discovery
Different events (information, warning, errors) and logs (service logs, audit logs, event logs) are generated and maintained in Resiliency Platform to track system or user-initiated changes. The solution monitors Replication State to check the current state of your data replication.
For Hyper-V Replica, the Replication State attribute comes from the Replication End-Point object. For EMC SRDF, the Replication State attribute comes from EMC Symmetrix consistency group. The replication state of a consistency group is monitored to detect any replication failure, and notify user.
Note:
For EMC SRDF, the replication is supported at the consistency group-level, and all the virtual machines residing in a resiliency group must consume storage from the same consistency group.
The state of the replication is monitored and a corresponding event is generated when the replication fails. The event notification can be seen on the Resiliency Platform web console. In addition, the notification is sent by email to the recipients who are configured for SMTP. An SNMP trap is also generated, which can be used by the listener, for example, any application using the generated SNMP trap.