Skip to content

Machines replication#

Machines replication consists of several steps:

  1. Installing agents and configuring replication
  2. Getting consistent machines snapshots
  3. Detecting changes on machines between two snapshots
  4. Sending deltas to the target platform with regard to WAN optimization and deduplication
  5. Storing of incremental snapshots with regard to the snapshot storage policies

Retrieving machines snapshots and detecting changes#

Depending on the initial virtualization platform, it is possible to obtain consistent snapshots of machines in one of the following ways:

  • in case of replicating machines on VMware, getting snapshots of Windows and Linux machines is done with standard tools of VMware (VMware CBT API), leveraging a chain of internal API calls and snapshots as well as the means of the machine's OS itself.
  • in the case of replicating machines from oVirt, getting snapshots of the machines is done using standard oVirt tools. oVirt takes a snapshot at the start of replication, at the end of replication it deletes the snapshot from the previous replication, leaving a new one, an incremental replica is taken based on the definition of new blocks between two snapshots. In this regard, it is not recommended to delete the latest snapshot of the source machines. The oVirt API is used to create snapshots, and the oVirt-imageio API is used to read data.
  • for Windows machines, consistent snapshots are acquired by means of Volume Shadow Storage (VSS) calls and tracking changes between two Application-consistent snapshots
  • for Linux machines, consistent snapshots are acquired by implementation of the VSS snapshot analog for block devices and sending changes to the snapshot store.

Warning

In case of a VMware infrastructure replication, VMware Tools must be installed on your virtual machines.

Sending deltas to storage. Data deduplication#

Deltas are the accumulated changes since the last replication.

Sending deltas to the target platform is done using customer agent secure HTTPS protocol. This constitutes the deduplication process - the customer application only sends data that is not yet stored for the given customer allowing to significantly save the amount of transferred items, reduce load on the network and, at times, accelerate replication of machines.

In addition to WAN deduplication, optimization also includes compression of the network traffic.

Creating a group of machines#

Once a customer dashboard has been created as part of product's initial configuration for replicating machines, navigate to the main page and select machine groups. Grouping machines allows to merge them by functionality or common parameters of replication schedule.

See Groups actions for detailed information about groups operations.

Setting replication schedule#

Как только расписание будет настроено, на основании него машины будут реплицированы.

Once machines have appeared in the list and replication has been enabled for the specified machines, it is necessary to set replication schedules. This is described in the section Edit Replication schedule.

Warning

Pay you attention that settings can be changed globally for a customer, for each individual group or for individual machines.

Once these steps are completed, the machines will be replicated based on schedule and rules that have been set during the configuration.

Machines replication and distribution between groups#

Once groups have been created, you can proceed to replicate machines. To do this, follow the machine replication process (Section: ACP - Replicating machines) directly from the menu or through the group settings using the Register new platform menu item. The second option will automatically select a group for the machine during the relevant migration process step.

Select the type of a replicated platform.

pd_protect_flow

Further steps for working with the Replication Agent Download Wizard are available at the following links:

Replication agent installation and configuration#

VMware Agent#

VMware Agent is an external replication agent type that is deployed as a separate instance in the source environment.

Requirements#

VMware Replication Agent requires the following user permissions in vSphere (Role "VMware Consolidated Backup user" in vCenter):

  • Virtual machine - Configuration -- Disc Lease
  • Virtual Machine - Interact -- Power On
  • Virtual Machine - Interact -- Power Off
  • Virtual machine - Provisioning -- Allow read-only disk access
  • Virtual machine - Provisioning -- Allow virtual machine files upload
  • Virtual machine - Snapshot management -- Create snapshot
  • Virtual machine - Snapshot management -- Remove Snapshot

Permission to access CBT is necessary for the correct performance of the application. To enable CBT:

Virtual machine - Configuration - Disc change tracking

Additionally, it is recommended to include the following global permissions:

  • Global - Disable methods
  • Global - Enable methods
  • Global - Licenses

Note

In case of using vCloud, vCenter user requires one extra permission to operate: Profile-driven storage -> Profile-driven storage view

Ports for correct agent work:

  • Acura host for Live Migration - tcp/80, tcp/443
  • vSphere host - tcp/443
  • ESXi host(s) - tcp/udp/902
  • Send logs to Acura cluster - udp/12201

VMware Replication Agent uses VMware snapshots and VMware CBT API in order to create consistent replicas of machines' data.

This implies the following considerations regarding the VMware storage:

  • VMware snapshots consume storage to retain copy-on-write buffer, so it is recommended to have at least 10% free space available on VMware storage.
  • VMware puts additional load on storage while creating snapshots or running machines with existing snapshots.

Please consider that storage performance warning thresholds need to be adjusted in order to meet this increased load during replication.

Warning

The source machine must have VMware Tools installed manually prior to any replication procedures for it to display its network information in the target VMware ESXi correctly.

Installation#

The first two steps that must be completed to successfully install the VMware replication agent are described in the section Machines replication and distribution between groups.

Step 3. Agent options#

For successful installation, on the third step just select the group to which the protected machines will be added and click 'Next'. Details about creating groups of machines are described here.

Configure cloud access settings for VMware protection. When all of the above is done, you can move further and click 'Next'.

pd_protect_flow3_vmware

If the platform is not on the list, it must be registered. Just select 'New VMware vSphere' instead of 'Registered VMware vSphere' and fill in all fields. Click on the '?' for hints about fields. Click the 'Next' button, when finish. The installation wizard will check the correctness of the entered data. If correct, goes to the next step.

pd_protect_flow3_vmware_new

Field Description Example
Cloud name The name of the cloud which will be shown in the UI. The name must be unique. vcenter
Endpoint Endpoint to connect to vcenter.dts.loc
Login User login username
Password Password to access the target cloud password
Use enforce quiesce strategy By default, the agent will try to quiesce the machine, create non-quiesce snapshot in case if quiesce is falling. When the checkbox is checked, non-quiesce snapshot will not be created. unchecked
Use cluster level discover Enable devices discover on cluster level. If unchecked, devices discover will be performed on host level. unchecked
On replication start Whether to change source machine power state on replication start No action
On replication finish Whether to change source machine power state on replication finish No action
Storage threshold per machine disk Run application on if datastore has free space X percent of total disk size (0 – unlimited) 0
Free space storage threshold Run application on if datastore has X percent of total disk size (0 – unlimited) 0

Pay special attention to the 'On replication start', 'On replication finish' fields. This settings allow you to power off or power on the source virtual machine when replication starts/ends. The default value is 'No action': the state of the machine will not be changed.

pd_protect_flow3_vmware_onstartstop

Additionally, it is possible to specify static network settings. Switch 'Agent network settings' to 'Static' and fill in the fields.

pd_protect_flow3_vmware_settings

Field Description Example
Agent IP The IP address of the agent 172.22.6.230
Subnet mask The subnet mask of the agent 255.255.0.0
Gateway Agent gateway 172.22.1.2
DNS servers DNS of the agent’s server. You can specify multiply addresses separated by commas. 1.1.1.1, 2.2.2.2
Step 4. Protection instructions#

On the fourth step there is a 'Download agent' button and protection instructions. To successfully install the agent, carefully follow the instructions on the screen:

  1. Download agent OVA file using the 'Download agent' button above and deploy it on each ESXi host in your VMware cluster you want to protect.
  2. Launch deployed VMs (agents) to protect machines on each host.

pd_protect_flow4_vmware

Machines will be detected and shown in a target group in a few minutes after agent deployment and launch. By default, all discovered machines will have 'Unprotected' status. Select machines you want to protect and use 'Actions -> Start Protection' to start protecting them.

Alternativaly use Download Replication Agent item on Manage Clouds page to get the agent's file.

A agent's instance must have at least 2 CPUs and 4 GB RAM and must be deployed on each of the ESXi hosts that have machines intended for replication.

Note

VMware vSphere can issue a warning about the presence of an unknown configuration parameter for the virtual machine. The service parameter "hvragent" is added deliberately and it is not a security risk.

VMware Agent configuration#

Use TUI to change network settings, IP addresses and configuration files. On the main window agent ID (in format AGENT_ID (CLOUD_ID)@CUSTOMER_ID), statuses and logs are shown. There are To console and Agent options buttons at the bottom of the window.

ao_tui_cabrio_main

Select To console if you prefer to configure via command line, otherwise press Agent options.

Note

We highly recommend to configure agent via Agent options.

In addition you can access TUI via ssh. Use user user and password px%96jA-8zX{ to log in. You can also use SSH key (if set in the cloud). The third button Exit console will appear. Use it to close ssh session.

Console#

After pressing To console the console will launch. The list of available commands will appear on the screen. Use it to configure parameters. To exit the console enter exit.

ao_tui_cabrio_console

To edit machine hostname use command sudo vi /etc/hostname or sudo nano /etc/hostname.

Note

Restart the machine to apply the changes.

Agent logs are stored in "/var/log/cabrio/cabrio.log".

Agent options#

Note

We highly recommend to use this option to configure agent.

The menu will appear on the screen.

ao_tui_cabrio_agentoptions

Warning

Changes perform here may automatically restart agent services, interrupting all running tasts. Configure the agent when it's idle.

1. Restart agent services restarts the services just right after the confirmation. The success of the restart can be tracked by the logs of the main window, which will appear immediately after the operation is confirmed.

2. Enable/disable debug logging adds/removes debug information to/from log. By default debug information is disabled.

3. Edit network. NetworkManager TUI will be launched when select this menu.

ao_tui_cabrio_NM

4. Edit hosts starts text editor GNU nano to edit data stored into /etc/hosts. Use it to specify DNS-names manually.

ao_tui_cabrio_hosts

5. Edit controller addresses is used to update IP addresses and ports. The menu will appear when clisk.

ao_tui_cabrio_addresses

Update IP address of the controller (Update all addresses at once):

ao_tui_cabrio_addresses_01

configure restAPI, receiver, report, stash, or logstash IP optionally (Update individual addresses):

ao_tui_cabrio_addresses_02

6. Edit agent common config starts text editor GNU nano to edit configuration file. If necessary update certificates, users or agents IDs. Controller addresses (can also be changed via 5. Edit controller addresses) are available for editing either.

ao_tui_cabrio_06

Warning

Do not update role and cloud_type fields.

7. Edit agent service config starts text editor GNU nano to edit service configuration file.

ao_tui_cabrio_07

Note

File content depends on the agent type.

oVirt Agent#

oVirt Agent is an external replication agent type that is deployed as a separate instance in the source environment.

Requirements#

Note

Replication Agent for requires superuser permissions for installation.

  • Hardware:
    • Memory: at least 4 GB RAM
    • CPU: at least 2 CPUs
    • Disk space: at least 10 GB required. Disk will be downloaded with fix size = 10Gb. It is whole disk of new deployed VM.
  • Ports for correct agent work:
    • DR host - tcp/80, tcp/443
    • Send logs to the Acura cluster - udp/12201

An agent instance must be deployed on each of the hosts that have machines intended for replication.

Installation#

The first two steps that must be completed to successfully install the oVirt replication agent are described in the section Machines replication and distribution between groups.

Step 3. Agent settings#

For successful installation, on the third step just select the group to which the protected machines will be added and click 'Next'. Details about creating groups of machines are described here.

Configure cloud access settings for oVirt protection. When all of the above is done, you can move further and click 'Next'.

pd_protect_flow3_ovirt

If the platform is not on the list, it must be registered. Just select 'New oVirt' instead of 'Registered oVirt' and fill in all fields. Click on the '?' for hints about fields. Click the 'Next' button, when finish. The installation wizard checks the correctness of the entered data. If correct, goes to the next step.

pd_protect_flow3_ovirt_new

Field Description Example
Cloud name The name of the cloud which will be shown in UI. The name must be unique zvirt_source
oVirt API endpoint oVirt API endpoint of target cloud https://zvirtnode/ovirt-engine/api
Username Username to access the target cloud [email protected]
Password Parrword to access the target cloud password
Discovery level Configures the level on which replication agents discover machines Cluster

Pay special attention to the 'Discovery level' field. This fiels configures the level on which replication agents discover virtual machines. This could be the cluster, host, data center or entire cloud level. For example, setting level to 'Cluster' means that one (and only one) instance of replication agent has to be deployed on each cluster. Each agent instance discover machines only from the corresponding cluster. Likewise for other levels.

pd_protect_flow3_ovirt_searchlevel

Step 4. Protection instructions#

On the fourth step there is a 'Download agent' button and protection instructions. To successfully install the agent, carefully follow the instructions on the screen:

  1. Download agent RAW file using the 'Download agent' button above and deploy one or multiple VMs on oVirt, according to chosen discovery level.

  2. Start deployed VMs (agents) to protect machines.

pd_protect_flow4_zvirt

Machines will be detected and shown in a target group in a few minutes after agent deployment and launch. By default, all discovered machines will have 'Unprotected' status. Select machines you want to protect and use 'Actions -> Start Protection' to start protecting them.

Alternativaly use Download Replication Agent item on page Manage Clouds to get the agent's file.

oVirt Agent configuration#

Use TUI to change network settings, IP addresses and configuration files. On the main window agent ID (in format AGENT_ID (CLOUD_ID)@CUSTOMER_ID), statuses and logs are shown. There are To console and Agent options buttons at the bottom of the window.

ao_tui_orca_main

Select To console if you prefer to configure via command line, otherwise press Agent options.

Note

We highly recommend to configure agent via Agent options.

In addition you can access TUI via ssh. Use user user and password px%96jA-8zX{ to log in. You can also use SSH key (if set in the cloud). The third button Exit console will appear. Use it to close ssh session.

Console#

After pressing To console the console will launch. The list of available commands will appear on the screen. Use it to configure parameters. To exit the console enter exit.

ao_tui_orca_console

To edit machine hostname use command sudo vi /etc/hostname or sudo nano /etc/hostname.

Note

Restart the machine to apply the changes.

Agent logs are stored in "/var/log/orca/orca.log".

Agent options#

Note

We highly recommend to use this option to configure agent.

The menu will appear on the screen.

ao_tui_cabrio_agentoptions

Warning

Changes perform here may automatically restart agent services, interrupting all running tasts. Configure the agent when it's idle.

1. Restart agent services restarts the services just right after the confirmation. The success of the restart can be tracked by the logs of the main window, which will appear immediately after the operation is confirmed.

2. Enable/disable debug logging adds/removes debug information to/from log. By default debug information is disabled.

3. Edit network. NetworkManager TUI will be launched when select this menu.

ao_tui_cabrio_NM

4. Edit hosts starts text editor GNU nano to edit data stored into /etc/hosts. Use it to specify DNS-names manually.

ao_tui_orca_hosts

5. Edit controller addresses is used to update IP addresses and ports. The menu will appear when clisk.

ao_tui_cabrio_addresses

Update IP address of the controller (Update all addresses at once):

ao_tui_cabrio_addresses_01

configure restAPI, receiver, report, stash, or logstash IP optionally (Update individual addresses):

ao_tui_cabrio_addresses_02

6. Edit agent common config starts text editor GNU nano to edit configuration file. If necessary update certificates, users or agents IDs. Controller addresses (can also be changed via 5. Edit controller addresses) are available for editing either.

ao_tui_orca_06

Warning

Do not update role and cloud_type fields.

7. Edit agent service config starts text editor GNU nano to edit service configuration file.

ao_tui_orca_07

Note

File content depends on the agent type.

Linux Agent#

Requirements#

  • Replication Agent for Linux requires sudo permissions for installation

  • Hardware:
    • Memory: 500 MB RAM
    • Disk space: 100 MB required for product installation and not less than 15% free space of the disk size for snapshots creation
  • Ports needed for the correct work:
    • Send data to Acura host - tcp/443
    • Send logs to Acura - udp/12201

Installation#

The first two steps that must be completed to successfully install the Linux replication agent are described in the section Machines replication and distribution between groups.

Step 3. Agent settings#

Acura offers a choice between replication agent builds that depends on customer's preferences and the actual use case.

To successfully install the replication agent, on the third step you need to select the previously created group (section Creating a group of machines) to which the protected machines must be added, select the target distribution (Debian/Ubuntu, CentOS/RHEL), the snapshot driver deployment type and click the "Next" button.

Click on "Show supported kernels" during Step 3 of the Download agents wizard, to see the full list of natively included versions.

pd_protect_flow3_linux

Pre-built and DKMS Agent types#

There are two driver deployment types to choose from: pre-built and DKMS.

pd_protect_flow3_linux_driver

  • The pre-built driver package (available both for Debian/Ubuntu and CentOS/RHEL distributions) requires no additional dependencies, but the supported Linux kernel list is limited. Use pre-built package for machines that are infrequently updated or have no Internet connection to install DKMS and other dependencies.

  • The DKMS driver package will build the driver on installation. It has a broad Linux kernel support and will rebuild the driver on kernel updates. It requires DKMS, build tools and kernel headers to be installed on the machine. Use DKMS package for machines that are frequently updated or not supported by the pre-built package.

Click the "Next" button to proceed. Depending on the type of driver deployment you choose, the protection instructions on step four vary:

Step 4. Protection instructions#

On the fourth step there is a 'Download agent' button and protection instructions. An agent with a pre-build package and DKMS have different protection instructions. To successfully install the agent, carefully follow the instructions on the screen.

Protection instructions for an agent with a pre-built package#
  1. Download a deb/rpm agent installer package file using the link above or copy copy_button the command below to run it in a terminal.

    curl -k -o hlragent.deb 'automatically generated link' copy_button

  2. Copy the package to the Linux machine you would like to protect. Use deb package for Ubuntu/Debian machines and rpm package for RHEL/CentOS machines.

  3. Install the agent using the following commands (superuser privileges required):

    • for Ubuntu/Debian machines: dpkg -i hlragent.deb
    • for RHEL/CentOS machines: rpm -i hlragent.rpm

pd_protect_flow4_linux_prebuild

The machine will be registered and shown in a target group in a few minutes after agent installation. By default, the discovered machine will have 'Unprotected' status. To start protection, select the machine and use 'Actions -> Start Protection'.

Protection instructions for an agent with DKMS#
  1. Install DKMS, build requirements and Linux header files for current kernel and future updates on the machine (superuser privileges required):

    • for Ubuntu machines: apt-get update && apt-get install dkms perl make gcc libelf-dev linux-headers-$(uname -r) linux-headers-generic
    • for Debian machines: apt-get update && apt-get install dkms perl make gcc libelf-dev linux-headers-$(uname -r) linux-headers-amd64
    • for RHEL/CentOS machines: add EPEL repository and run yum install dkms perl make gcc elfutils-libelf-devel kernel-devel-$(uname -r) kernel-devel
  2. Download a deb/rpm agent installer package file using the link above or copy copy_button the command below to run it in a terminal.

    curl -k -o hlragent.deb 'automatically generated link' copy_button

  3. Copy the package to the Linux machine you would like to protect. Use deb package for Ubuntu/Debian machines and rpm package for RHEL/CentOS machines.

  4. Install the agent using the following commands (superuser privileges required):

    • for Ubuntu/Debian machines: dpkg -i hlragent.deb
    • for RHEL/CentOS machines: rpm -i hlragent.rpm

pd_protect_flow4_linux_dkms

The machine will be registered and shown in a target group in a few minutes after agent installation. By default, the discovered machine will have 'Unprotected' status. To start protection, select the machine and use 'Actions -> Start Protection'.

Windows Agent#

Requirements#

  • Replication Agent for Windows requires administrative permissions for installation

  • Hardware:
    • Memory: 2 GB RAM
    • CPU: x64 processor
    • Disk space: 100 MB required for product installation and not less than 15% free space of the disk size for VSS snapshots creation
  • Software:
    • Microsoft .NET Framework 4.0

Warning

Windows replication agent must be installed by the System Administrator or using Administrator privileges. Otherwise, it will not have enough permissions to use API or create snapshots and the replication will fail.

Installation#

The first two steps that must be completed to successfully install the Windows replication agent are described in the section Machines replication and distribution between groups.

For successful installation, on the third step just select the group to which the protected machines will be added and click "Next". Details about creating groups of machines are described here. After this, the fourth step opens. There is a 'Download agent' button and protection instructions. To successfully install the agent, carefully follow the instructions on the screen:

  1. Download the zipped agent installer package using 'Download agent' button.
  2. Copy the archive to a Windows machine that is intended for replication.
  3. Unzip the archive and run hwragent.msi to install replication services.

pd_protect_flow34_windows

The machine will be registered and shown in a target group in a few minutes after the agent installation. By default, the discovered machine will have the "Discovered" status. To start replication, select the machine and use "Actions -> Start Replication".

pd_protect_flow34_windows