지금 지원 담당자와 채팅
지원 담당자와 채팅

vRanger 7.8.6 - User Guide

Introduction vRanger overview Configuring vRanger
Configuring vRanger through the Startup Wizard Configuring vRanger manually Supplemental instructions: additional repository types
Using vRanger Backup Restore
Restoring an encrypted VMware VM Performing a full restore for VMware VMs Performing a full restore for Hyper-V® VMs Performing a full restore for VMware vApps Performing a full restore of a physical machine Performing an FLR on Windows Performing an FLR on Linux Restoring from manifest
Replicate VMs Reports Integrating and monitoring vRanger Using the vRanger Console vAPI Cmdlet details

Determining application consistency

The levels of, and methods for providing, application consistency differ between VM backups and backups of physical servers. For more information, see the following topics:

Application consistency for virtual backups

vRanger provides various levels of protection for VMs. The means that each level uses to accomplish its task depends on the type of VM being protected.

Application consistency for VMware VMs

By default, vRanger does not provide quiescing during backups. When you enable the Enable Guest Quiescing option, quiescing in vRanger is provided by leveraging the VMware® Tools installed in the VM.

This feature can provide three different levels of backup consistency:

Crash consistent: A crash-consistent backup is analogous to pulling the plug on a server and then backing up the data. The state of the data that is being backed up with respect to the users of the data is indeterminate. Restoring a crash-consistent image is equivalent to rebooting a server after a hard shut-down.
File-system consistent: File-system consistency is achieved through standard quiescing by using the VMware Sync Driver, which ensures that no file-system writes are pending when the snapshot is taken. For normal VMs, file-system consistency is adequate, although it can cause corruption in database applications.
Application consistent: Consistency of VSS-compatible applications is achieved by freezing application I/Os prior to creating the VM snapshots. This option ensures that all application writes requests in the machines memory are committed to disk before the snapshot is taken.

The level of consistency provided by the Enable Guest Quiescing option depends on the version of VMware® ESXi™ — and the corresponding VMware Tools — and the guest operating system. The following table provides more detail on what is needed to achieve various levels of consistency:

 

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

 

 

 

vzShadow.exe

vzShadow.exe

vzShadow.exe

vzShadow.exe

vzShadow.exe

vzShadow.exe

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

VMware VSS

As shown in the preceding table, application consistency is not always available with the basic quiescing options. In these situations, you may use the vRanger VSS Tools — vzShadow.exe — for application-level consistency.

Application consistency for Hyper-V VMs

vRanger can provide two levels of consistency for Hyper-V® VM backups: file-system consistency and application consistency.

File-system consistent: File-system consistency is achieved without any additional tools or configurations. File-system consistency ensures that no file system writes were lost during the backup process.
Application consistent: vRanger engages the Microsoft Volume Shadow Copy Services (VSS) to put supported applications into a consistent state during a backup. This option ensures that all application writes requests in the machines memory are committed to disk before the snapshot is taken, which means that the application and data can be reliably recovered from the backup archive.

To achieve either type of application consistency, you must comply with the following requirements:

The vRanger agent installed on the Hyper-V host uses the VSS native to the Windows operating system to support the truncation of any supported application transaction logs. Log truncation automatically frees space in the logical log for the transaction log to reuse.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택