首頁 > 計算機網絡 >
計算機安全
> Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager最新章節目錄
舉報

會員
Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
最新章節:
Index
ThisisastepbystepguidethatwillhelpyouunderstanddisasterrecoveryusingVMwarevSphereReplication5.5andVMwarevCenterSiteRecoveryManager(SRM)5.5.Thetopicsandconfigurationproceduresareaccompaniedwithrelevantscreenshots,flowcharts,andlogicaldiagramsthatmakesgraspingtheconceptseasier.ThisbookisaguideforanyonewhoiskeenonusingvSphereReplicationorvCenterSiteRecoveryManagerasadisasterrecoverysolution.Thisisanexcellenthandbookforsolutionarchitects,administrators,on-fieldengineers,andsupportprofessionals.AlthoughthebookassumesthatthereaderhassomebasicknowledgeofdatacentervirtualizationusingVMwarevSphere,itcanstillbeaverygoodreferenceforanyonewhoisnewtovirtualization.
目錄(63章)
倒序
- coverpage
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Installing and Configuring vCenter Site Recovery Manager (SRM) 5.5
- Introduction
- So what exactly are RPO and RTO?
- What is Site Recovery Manager (SRM)?
- Laying the groundwork for an SRM environment
- Summary
- Chapter 2. Creating Protection Groups and Recovery Plans
- Datastore groups
- Protection Groups
- Creating a Protection Group
- Recovery Plans
- Creating a Recovery Plan
- Summary
- Chapter 3. Testing and Performing a Failover and Failback
- Testing a Recovery Plan
- Performing a Planned Migration
- Performing a disaster recovery (Failover)
- Forced Recovery
- Reprotecting a site
- Failback to the protected site
- Configuring VM recovery properties
- Summary
- Chapter 4. Deploying vSphere Replication 5.5
- Introduction
- Downloading the vSphere Replication bundle
- Deploying the vSphere Replication Appliance
- Setting up the VRA hostname and a VRM site name for the VRA
- Configuring a SQL database for VRMS
- Deploying a vSphere Replication Server
- Registering vSphere Replication Servers
- Summary
- Chapter 5. Configuring and Using vSphere Replication 5.5
- Adding a remote site as a target
- Configuring the replication of a VM to the local site
- Configuring the replication of a VM to a remote site
- How does replication work?
- Using the replication seeds
- Monitoring a replication
- Reconfiguring a replication
- Changing the target datastore
- Pausing an ongoing replication
- Synchronizing data immediately
- Stopping a replication on a VM
- Moving a replication to another VR Server
- Recovering virtual machines
- Configuring a Failback for virtual machines
- Configuring SRM to leverage vSphere Replication
- Summary
- Index 更新時間:2021-07-16 11:49:09
推薦閱讀
- 信息系統安全檢測與風險評估
- 數字安全藍皮書:本質屬性與重要特征
- 代碼審計:企業級Web代碼安全架構
- 諸神之眼:Nmap網絡安全審計技術揭秘
- Computer Forensics with FTK
- 隱私計算
- Building a Home Security System with BeagleBone
- 數據保護:工作負載的可恢復性
- 黑客攻防實戰從入門到精通
- 捍衛隱私
- 交換機·路由器·防火墻(第2版)
- Android Application Security Essentials
- Manga Studio 5 Beginner's Guide
- 互聯網域名國際化與安全技術導論
- 數據安全實踐:能力體系、產品實現與解決方案
- 網絡安全攻防技術實戰
- 隱私計算與密碼學應用實踐
- 商用密碼發展報告(2012—2017年)
- 從實踐中學習Fiddler Web應用分析
- 關鍵信息基礎設施安全保護方法與應用
- INSTANT Citrix Security How-to
- INSTANT Spring Security Starter
- 無線網絡安全攻防實戰進階
- 內生安全:新一代網絡安全框架體系與實踐
- 黑客攻防與網絡安全從新手到高手(實戰篇)
- 物聯網安全與隱私保護
- AWS Certified Security:Specialty Exam Guide
- SELinux System Administration
- 大數據安全治理與防范:流量反欺詐實戰
- 涉密信息管理系統