Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site ClusteringGreg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
What Makes a Disaster?Which of the following would you consider a disaster?
A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage.  That damage causes the entire processing of that datacenter to cease.
A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.What Makes a Disaster?Which of the following would you consider a disaster?
A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage.  That damage causes the entire processing of that datacenter to cease.
A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.DISASTER!JUST A BAD DAY!
What Makes a Disaster?Your decision to “declare a disaster” and move to “disaster ops” is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.
What Makes a Disaster?Your decision to “declare a disaster” and move to “disaster ops” is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.Failover and failback processes involve more thought.You might not be able to just “fail back” with a click of a button.
A Disastrous PollWhere are We?  Who Here is
Planning a DR Environment?In Process of Implementing One?Already Enjoying One?What’s a “DR Environment” ???
Multi-Site Hyper-V == Single-Site Hyper-VDON’T PANIC:  Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.
Multi-Site Hyper-V == Single-Site Hyper-VDON’T PANIC:  Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.But there are some major differences too
VMs can Live Migrate across sites.Sites typically have different subnet arrangements.Data in the primary site must be replaced with the DR site.Clients need to know where your servers go!
Constructing Site-Proof Hyper-V:Three Things You NeedAt a very high level, Hyper-V disaster recovery is three things:A storage mechanismA replication mechanismA set of target servers and a cluster to receive virtual machines and their dataOnce you have these three things, layering Hyper-V atop is easy.
Constructing Site-Proof Hyper-V:Three Things You NeedReplication MechanismStorage Device(s)Target Servers
Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.
Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.Backup SAN doesn’t necessarily need to be of the same size or speed as the primary SANReplicated data isn’t always full set of data.You may not need disaster recovery for everything.DR Environments:  Where Old SANs Go To Die.
Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish this
.
Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish this
.SynchronouslyChanges are made on one node at a time.  Subsequent changes on primary SAN must wait for ACK from backup SAN.AsynchronouslyChanges on backup SAN will eventually be written.  Changes queued at primary SAN to be transferred at intervals.
Thing 2:A Replication MechanismSynchronouslyChanges are made on one node at a time.  Subsequent changes on primary SAN must wait for ACK from backup SAN.
Thing 2:A Replication MechanismAsynchronouslyChanges on backup SAN will eventually be written.  Are queued at primary SAN to be transferred at intervals.
Class DiscussionWhich would you choose?  Why?Class DiscussionWhich would you choose?  Why?
Synchronous
Assures no loss of data.
Requires a high-bandwidth and low-latency connection.
Write and acknowledgement latencies impact performance.
Requires shorter distances between storage devices.
Asynchronous
Potential for loss of data during a failure.
Leverages smaller-bandwidth connections, more tolerant of latency.
No performance impact.
Potential to stretch across longer distances.
Your Recovery Point Objective makes this decision
Thing 2œ:Replication Processing LocationThere are also two locations for replication processing

Thing 2œ:Replication Processing LocationThere are also two locations for replication processing
Storage LayerReplication processing is handled by the SAN itself.Agents are often installed to virtual hosts or machines to ensure crash consistency.Easier to set up, fewer moving parts.  More scalable.Concerns about crash consistency.OS / Application LayerReplication processing is handled by software in the VM OS.This software also operates as the agent.More challenging to set up, more moving parts.  More installations to manage/monitor.  Scalability and cost are linear.Fewer concerns about crash consistency.
Thing 3:Target Servers and a ClusterFinally are target servers and a cluster in the backup site.
Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”
Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability.  Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).
Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability.  Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)
Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability.  Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)Windows 2008 R2Improvements to Cluster Validation Wizard and Migration Wizard.Additional cluster services.Cluster Shared Volumes (!) and Live Migration (!)
So, What IS a Cluster?
So, What IS a Cluster?Quorum Drive & Storage for Hyper-V VMs
So, What IS a Multi-Site Cluster?
Quorum:  Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?
Quorum:  Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?A cluster “exists” because it has quorum between its members.  That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.
Quorum:  Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?A cluster “exists” because it has quorum between its members.  That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.If a cluster “loses quorum”, the entire cluster shuts down and ceases to exist.  This happens until quorum is regained.This is much different than a resource failover, which is the reason why clusters are implemented.Multiple quorum models exist.
Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority:  Disk Only
Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority:  Disk Only
Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority:  Disk Only
Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority:  Disk Only
Quorum in Multi-Site ClustersNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority:  Disk OnlyMicrosoft recommends using the Node and File Share Majority model for multi-site clusters.This model provides the best protection for a full-site outage.Full-site outage requires a file share witness in a third geographic location.

More Related Content

What's hot

Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practices
Joep Piscaer
 
Virtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandVirtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On Demand
Yan Pritzker
 
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
buildacloud
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting
AlexTian
 
Orchestration for the rest of us
Orchestration for the rest of usOrchestration for the rest of us
Orchestration for the rest of us
JĂ©rĂŽme Petazzoni
 
NetApp against ransomware
NetApp against ransomwareNetApp against ransomware
NetApp against ransomware
Damien Berezenko
 
ESX performance problems 10 steps
ESX performance problems 10 stepsESX performance problems 10 steps
ESX performance problems 10 steps
Concentrated Technology
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache Cloudstack
Radhika Puthiyetath
 
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
Amazon Web Services
 
SQL Server Clustering for Dummies
SQL Server Clustering for DummiesSQL Server Clustering for Dummies
SQL Server Clustering for Dummies
Mark Broadbent
 
Compare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL ServerCompare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL Server
AlexDepo
 
NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebook
pamolson
 
Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloud
ahmedmehiny
 
Why resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudesWhy resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudes
Uwe Friedrichsen
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloud
sankarimsc
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
rjain51
 
Vs host clustering
Vs host clusteringVs host clustering
Vs host clustering
rickythekid
 
JavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jcloudsJavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jclouds
zshoylev
 
CloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCatCloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCat
Andrew Bayer
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4
Sheng Yang
 

What's hot (20)

Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practices
 
Virtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandVirtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On Demand
 
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting
 
Orchestration for the rest of us
Orchestration for the rest of usOrchestration for the rest of us
Orchestration for the rest of us
 
NetApp against ransomware
NetApp against ransomwareNetApp against ransomware
NetApp against ransomware
 
ESX performance problems 10 steps
ESX performance problems 10 stepsESX performance problems 10 steps
ESX performance problems 10 steps
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache Cloudstack
 
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
 
SQL Server Clustering for Dummies
SQL Server Clustering for DummiesSQL Server Clustering for Dummies
SQL Server Clustering for Dummies
 
Compare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL ServerCompare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL Server
 
NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebook
 
Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloud
 
Why resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudesWhy resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudes
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloud
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Vs host clustering
Vs host clusteringVs host clustering
Vs host clustering
 
JavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jcloudsJavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jclouds
 
CloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCatCloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCat
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4
 

Viewers also liked

Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
Concentrated Technology
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
Concentrated Technology
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
Concentrated Technology
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
Concentrated Technology
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Don Reese
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
Concentrated Technology
 
Combining output from multiple sources
Combining output from multiple sourcesCombining output from multiple sources
Combining output from multiple sources
Concentrated Technology
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secret
Chris Conte
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
Rob Dunn
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
Concentrated Technology
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
Concentrated Technology
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
Concentrated Technology
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows Automation
Concentrated Technology
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
Concentrated Technology
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
Concentrated Technology
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functions
mikepfeiffer
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
Concentrated Technology
 
Automating ad with powershell
Automating ad with powershellAutomating ad with powershell
Automating ad with powershell
Concentrated Technology
 
Ad disasters & how to prevent them
Ad disasters & how to prevent themAd disasters & how to prevent them
Ad disasters & how to prevent them
Concentrated Technology
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
Salaudeen Rajack
 

Viewers also liked (20)

Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
 
Combining output from multiple sources
Combining output from multiple sourcesCombining output from multiple sources
Combining output from multiple sources
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secret
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows Automation
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functions
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
 
Automating ad with powershell
Automating ad with powershellAutomating ad with powershell
Automating ad with powershell
 
Ad disasters & how to prevent them
Ad disasters & how to prevent themAd disasters & how to prevent them
Ad disasters & how to prevent them
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
 

Similar to Implementing dr w. hyper v clustering

Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
Concentrated Technology
 
DataCore Solutions Overview
DataCore Solutions OverviewDataCore Solutions Overview
DataCore Solutions Overview
James Price
 
Top Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesTop Hyper-V Implementation Issues
Top Hyper-V Implementation Issues
Aidan Finn
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
Casey Bisson
 
Designing virtual infrastructure
Designing virtual infrastructureDesigning virtual infrastructure
Designing virtual infrastructure
Concentrated Technology
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
Casey Bisson
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
ShapeBlue
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
Concentrated Technology
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And Scalability
Jason Ragsdale
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
Kris Buytaert
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
1CloudRoad.com
 
Web Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQWeb Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQ
Web Werks Data Centers
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High Availabitiy
Eduardo Castro
 
South jersey sql virtualization
South jersey sql virtualizationSouth jersey sql virtualization
South jersey sql virtualization
Joseph D'Antoni
 
Sql saturday dc vm ware
Sql saturday dc vm wareSql saturday dc vm ware
Sql saturday dc vm ware
Joseph D'Antoni
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
Alan McSweeney
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
1CloudRoad.com
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
shabi_hassan
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
Stephen Rose
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
BusinesstoVirtual
 

Similar to Implementing dr w. hyper v clustering (20)

Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
 
DataCore Solutions Overview
DataCore Solutions OverviewDataCore Solutions Overview
DataCore Solutions Overview
 
Top Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesTop Hyper-V Implementation Issues
Top Hyper-V Implementation Issues
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
 
Designing virtual infrastructure
Designing virtual infrastructureDesigning virtual infrastructure
Designing virtual infrastructure
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And Scalability
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Web Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQWeb Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQ
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High Availabitiy
 
South jersey sql virtualization
South jersey sql virtualizationSouth jersey sql virtualization
South jersey sql virtualization
 
Sql saturday dc vm ware
Sql saturday dc vm wareSql saturday dc vm ware
Sql saturday dc vm ware
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 

More from Concentrated Technology

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
Concentrated Technology
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
Concentrated Technology
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
Concentrated Technology
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
Concentrated Technology
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
Concentrated Technology
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
Concentrated Technology
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
Concentrated Technology
 
Server Core2
Server Core2Server Core2
Server Core2
Concentrated Technology
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
Concentrated Technology
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
Concentrated Technology
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
Concentrated Technology
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
Concentrated Technology
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
Concentrated Technology
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
Concentrated Technology
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
Concentrated Technology
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
Concentrated Technology
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
Concentrated Technology
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
Concentrated Technology
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
Concentrated Technology
 
Iis implementation
Iis implementationIis implementation
Iis implementation
Concentrated Technology
 

More from Concentrated Technology (20)

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
 
Server Core2
Server Core2Server Core2
Server Core2
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
 
Iis implementation
Iis implementationIis implementation
Iis implementation
 

Recently uploaded

Top keywords searches on home and garden
Top keywords searches on home and gardenTop keywords searches on home and garden
Top keywords searches on home and garden
riannecreativetwo
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
Planetek Italia Srl
 
Indian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for StartupsIndian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for Startups
AMol NAik
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Alliance
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPathCommunity
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Alliance
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Alliance
 
Project management Course in Australia.pptx
Project management Course in Australia.pptxProject management Course in Australia.pptx
Project management Course in Australia.pptx
deathreaper9
 
Top keywords searches on business in AUS
Top keywords searches on business in AUSTop keywords searches on business in AUS
Top keywords searches on business in AUS
riannecreativetwo
 
Multimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup SlidesMultimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup Slides
Zilliz
 
Global Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdfGlobal Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdf
Sachin Chitre
 
Blue Screen Of Death | Windows Down | Biggest IT failure
Blue Screen Of Death | Windows Down | Biggest IT failureBlue Screen Of Death | Windows Down | Biggest IT failure
Blue Screen Of Death | Windows Down | Biggest IT failure
Dexbytes Infotech Pvt Ltd
 
Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...
Nohoax Kanont
 
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia
 
Getting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptxGetting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptx
Swaminathan Vetri
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
ScyllaDB
 
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptxSuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
nitishjain2015
 
The Challenge of Interpretability in Generative AI Models.pdf
The Challenge of Interpretability in Generative AI Models.pdfThe Challenge of Interpretability in Generative AI Models.pdf
The Challenge of Interpretability in Generative AI Models.pdf
Sara Kroft
 
Informatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptxInformatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptx
OkyPrayudi
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Alliance
 

Recently uploaded (20)

Top keywords searches on home and garden
Top keywords searches on home and gardenTop keywords searches on home and garden
Top keywords searches on home and garden
 
Planetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile BrochurePlanetek Italia Corporate Profile Brochure
Planetek Italia Corporate Profile Brochure
 
Indian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for StartupsIndian Privacy law & Infosec for Startups
Indian Privacy law & Infosec for Startups
 
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptxFIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
FIDO Munich Seminar: Biometrics and Passkeys for In-Vehicle Apps.pptx
 
UiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, ConnectUiPath Community Day Amsterdam: Code, Collaborate, Connect
UiPath Community Day Amsterdam: Code, Collaborate, Connect
 
FIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptxFIDO Munich Seminar: FIDO Tech Principles.pptx
FIDO Munich Seminar: FIDO Tech Principles.pptx
 
FIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptxFIDO Munich Seminar FIDO Automotive Apps.pptx
FIDO Munich Seminar FIDO Automotive Apps.pptx
 
Project management Course in Australia.pptx
Project management Course in Australia.pptxProject management Course in Australia.pptx
Project management Course in Australia.pptx
 
Top keywords searches on business in AUS
Top keywords searches on business in AUSTop keywords searches on business in AUS
Top keywords searches on business in AUS
 
Multimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup SlidesMultimodal Embeddings (continued) - South Bay Meetup Slides
Multimodal Embeddings (continued) - South Bay Meetup Slides
 
Global Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdfGlobal Collaboration for Space Exploration.pdf
Global Collaboration for Space Exploration.pdf
 
Blue Screen Of Death | Windows Down | Biggest IT failure
Blue Screen Of Death | Windows Down | Biggest IT failureBlue Screen Of Death | Windows Down | Biggest IT failure
Blue Screen Of Death | Windows Down | Biggest IT failure
 
Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...Generative AI technology is a fascinating field that focuses on creating comp...
Generative AI technology is a fascinating field that focuses on creating comp...
 
Securiport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat AnalysisSecuriport Gambia - Intelligent Threat Analysis
Securiport Gambia - Intelligent Threat Analysis
 
Getting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptxGetting Started with Azure AI Studio.pptx
Getting Started with Azure AI Studio.pptx
 
Using ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy WorkloadsUsing ScyllaDB for Real-Time Write-Heavy Workloads
Using ScyllaDB for Real-Time Write-Heavy Workloads
 
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptxSuratMeetup-MuleSoft + Salt Security for API Security.pptx
SuratMeetup-MuleSoft + Salt Security for API Security.pptx
 
The Challenge of Interpretability in Generative AI Models.pdf
The Challenge of Interpretability in Generative AI Models.pdfThe Challenge of Interpretability in Generative AI Models.pdf
The Challenge of Interpretability in Generative AI Models.pdf
 
Informatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptxInformatika smk kelas 10 kurikulum merdeka.pptx
Informatika smk kelas 10 kurikulum merdeka.pptx
 
FIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptxFIDO Munich Seminar: Securing Smart Car.pptx
FIDO Munich Seminar: Securing Smart Car.pptx
 

Implementing dr w. hyper v clustering

  • 1. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site ClusteringGreg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 2. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
  • 3. What Makes a Disaster?Which of the following would you consider a disaster?
  • 4. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
  • 5. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
  • 6. A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
  • 7. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
  • 8. An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.What Makes a Disaster?Which of the following would you consider a disaster?
  • 9. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
  • 10. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
  • 11. A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
  • 12. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
  • 13. An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.DISASTER!JUST A BAD DAY!
  • 14. What Makes a Disaster?Your decision to “declare a disaster” and move to “disaster ops” is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.
  • 15. What Makes a Disaster?Your decision to “declare a disaster” and move to “disaster ops” is a major one.The technologies used for disaster protection are different than those used for high-availability.More complex.More expensive.Failover and failback processes involve more thought.You might not be able to just “fail back” with a click of a button.
  • 16. A Disastrous PollWhere are We? Who Here is
Planning a DR Environment?In Process of Implementing One?Already Enjoying One?What’s a “DR Environment” ???
  • 17. Multi-Site Hyper-V == Single-Site Hyper-VDON’T PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.
  • 18. Multi-Site Hyper-V == Single-Site Hyper-VDON’T PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V.Microsoft has not done a good job of explaining this fact!Some Hyper-V hosts.Some networking and storage.Virtual machines that Live Migrate around.But there are some major differences too
VMs can Live Migrate across sites.Sites typically have different subnet arrangements.Data in the primary site must be replaced with the DR site.Clients need to know where your servers go!
  • 19. Constructing Site-Proof Hyper-V:Three Things You NeedAt a very high level, Hyper-V disaster recovery is three things:A storage mechanismA replication mechanismA set of target servers and a cluster to receive virtual machines and their dataOnce you have these three things, layering Hyper-V atop is easy.
  • 20. Constructing Site-Proof Hyper-V:Three Things You NeedReplication MechanismStorage Device(s)Target Servers
  • 21. Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.
  • 22. Thing 1:A Storage MechanismTypically, two SANs in two different locationsFibre Channel , iSCSI, FCoE, heck JBOD.Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.Backup SAN doesn’t necessarily need to be of the same size or speed as the primary SANReplicated data isn’t always full set of data.You may not need disaster recovery for everything.DR Environments: Where Old SANs Go To Die.
  • 23. Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish this
.
  • 24. Thing 2:A Replication MechanismReplication between SANs must occur.There are two commonly-accepted ways to accomplish this
.SynchronouslyChanges are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN.AsynchronouslyChanges on backup SAN will eventually be written. Changes queued at primary SAN to be transferred at intervals.
  • 25. Thing 2:A Replication MechanismSynchronouslyChanges are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN.
  • 26. Thing 2:A Replication MechanismAsynchronouslyChanges on backup SAN will eventually be written. Are queued at primary SAN to be transferred at intervals.
  • 27. Class DiscussionWhich would you choose? Why?Class DiscussionWhich would you choose? Why?
  • 29. Assures no loss of data.
  • 30. Requires a high-bandwidth and low-latency connection.
  • 31. Write and acknowledgement latencies impact performance.
  • 32. Requires shorter distances between storage devices.
  • 34. Potential for loss of data during a failure.
  • 35. Leverages smaller-bandwidth connections, more tolerant of latency.
  • 37. Potential to stretch across longer distances.
  • 38. Your Recovery Point Objective makes this decision
Thing 2Âœ:Replication Processing LocationThere are also two locations for replication processing

  • 39. Thing 2Âœ:Replication Processing LocationThere are also two locations for replication processing
Storage LayerReplication processing is handled by the SAN itself.Agents are often installed to virtual hosts or machines to ensure crash consistency.Easier to set up, fewer moving parts. More scalable.Concerns about crash consistency.OS / Application LayerReplication processing is handled by software in the VM OS.This software also operates as the agent.More challenging to set up, more moving parts. More installations to manage/monitor. Scalability and cost are linear.Fewer concerns about crash consistency.
  • 40. Thing 3:Target Servers and a ClusterFinally are target servers and a cluster in the backup site.
  • 41. Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”
  • 42. Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).
  • 43. Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)
  • 44. Clustering’s Sordid HistoryWindows NT 4.0Microsoft Cluster Service “Wolfpack”.“As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”Windows 2000Greater availability, scalability. Still painful.Windows 2003Added iSCSI storage to traditional Fibre Channel.SCSI Resets still used as method of last resort (painful).Windows 2008Eliminated use of SCSI Resets.Eliminated full-solution HCL requirement.Added Cluster Validation Wizard and pre-cluster tests.Clusters can now span subnets (ta-da!)Windows 2008 R2Improvements to Cluster Validation Wizard and Migration Wizard.Additional cluster services.Cluster Shared Volumes (!) and Live Migration (!)
  • 45. So, What IS a Cluster?
  • 46. So, What IS a Cluster?Quorum Drive & Storage for Hyper-V VMs
  • 47. So, What IS a Multi-Site Cluster?
  • 48. Quorum: Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?
  • 49. Quorum: Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?A cluster “exists” because it has quorum between its members. That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.
  • 50. Quorum: Windows Clustering’s Most Confusing ConfigurationEver been to a Kiwanis meeting
?A cluster “exists” because it has quorum between its members. That quorum is achieved through a voting process.Different Kiwanis clubs have different rules for quorum.Different clusters have different rules for quorum.If a cluster “loses quorum”, the entire cluster shuts down and ceases to exist. This happens until quorum is regained.This is much different than a resource failover, which is the reason why clusters are implemented.Multiple quorum models exist.
  • 51. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
  • 52. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
  • 53. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
  • 54. Four Options for QuorumNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk Only
  • 55. Quorum in Multi-Site ClustersNode and Disk MajorityNode MajorityNode and File Share MajorityNo Majority: Disk OnlyMicrosoft recommends using the Node and File Share Majority model for multi-site clusters.This model provides the best protection for a full-site outage.Full-site outage requires a file share witness in a third geographic location.
  • 56. Quorum in Multi-Site ClustersUse the Node and File Share QuorumPrevents entire-site outage from impacting quorum.Enables creation of multiple clusters if necessary.Third Site for Witness Server
  • 57. I Need a Third Site? Seriously?Here’s where Microsoft’s ridiculous quorum notion gets unnecessarily complicated
What happens if you put the quorum’s file share in the primary site?The secondary site might not automatically come online after a primary site failure.Votes in secondary site < Votes in primary siteLet’s count on our fingers

  • 58. I Need a Third Site? Seriously?Here’s where Microsoft’s ridiculous quorum notion gets unnecessarily complicated
What happens if you put the quorum’s file share in the secondary site?A failure in the secondary site could cause the primary site to go down.Votes in secondary site > votes in primary site.More fingers
This problem gets even weirder as time passes and the number of servers changes in each site.
  • 59. I Need a Third Site? Seriously?Third Site for Witness Server
  • 61. Multi-Site Cluster Tips/TricksInstall servers to sites so that your primary site always contains more servers than backup sites.Eliminates some problems with quorum during site outage.
  • 62. Multi-Site Cluster Tips/TricksManage Preferred Owners & Persistent Mode options.Make sure your servers fail over to servers in the same site first.But also make sure they have options on failing over elsewhere.
  • 64. Multi-Site Cluster Tips/TricksManage Preferred Owners & Persistent Mode options.Make sure your servers fail over to servers in the same site first.But also make sure they have options on failing over elsewhere.Consider carefully the effects of Failback.Failback is a great solution for resetting after a failure.But Failback can be a massive problem-causer as well.Its effects are particularly pronounced in Multi-Site Clusters.Recommendation: Turn it off, (until you’re ready).
  • 66. Multi-Site Cluster Tips/TricksResist creating clusters that support other services.A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.
  • 67. Multi-Site Cluster Tips/TricksResist creating clusters that support other services.A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.Use disk “dependencies” as Affinity/Anti-Affinity rules.Hyper-V all by itself doesn’t have an elegant way to affinitize.Setting disk dependencies against each other is a work-around.
  • 68. Multi-Site Cluster Tips/TricksResist creating clusters that support other services.A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.Use disk “dependencies” as Affinity/Anti-Affinity rules.Hyper-V all by itself doesn’t have an elegant way to affinitize.Setting disk dependencies against each other is a work-around.Add Servers in PairsEnsures that a server loss won’t cause site split brain.This is less a problem with the File Share Witness configuration.
  • 70. Most Important!Ensure that networking remains available when VMs migrate from primary to backup site.
  • 71. Most Important!Ensure that networking remains available when VMs migrate from primary to backup site.Clustering can span subnets!This is good, but only if you plan for it
Remember that crossing subnets also means changing IP address, subnet mask, gateway, etc, at new site.This can be automatically done by using DHCP and dynamic DNS, or must be manually updated.DNS replication is also a problem. Clients will require time to update their local cache.Consider reducing DNS TTL or clearing client cache.
  • 72. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site ClusteringGreg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 73. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC