Veeam Agents, both for Windows and for Linux, have the possibility to send backups to a Veeam Backup & Replication server. This is a great feature, but sometimes customers don’t even have anymore any virtualized workload to protect, so they find a hard time to justify the deployment of Veeam Backup & Replication to only protect physical workloads. There’s a solution to this however, and it doesn’t cost anything to users.
Last week, another outage of a large cloud provider hit the news, and the many companies using their services were impacted. This time it was Amazon Web Services, as their S3 service in the US-East region has been down for almost 4 hours, impacting so many other cloud services that are relying on this object storage technology. What impacted me, however, had been the reactions of other IT people around and the couch architects all over the world.
One year ago I built a complete and dedicated lab in order to permanently test and demonstrate Veeam Cloud Connect. The lab had been designed to operate as a production environment, and was also used for the Veeam Cloud Connect book I wrote. After a year, my SSL certificate was about to expire, so I […]
In my previous post of this small series, titled Security for your virtual machines: what is KMIP?, I talked about the new generation of the main hypervisors, VMware vSphere 6.5 and Microsoft Hyper-V 2016, and how they both introduced new encryption capabilities for virtual machines. I described the underlying technology used by VMware, KMIP; it’s not time to implement it in my lab and see how it interacts with data protection, specifically backups.
Veeam Backup & Replication has an entire list of Event IDs that are registered in the local Windows Event log, learn how to have and use this events list.
Learn how to fix the error “Unable to retrieve the migration assistant extension on source vCenter Server. Make sure migration assistant is running on the VUM server” when you are upgrading your vCenter Server appliance from 6.0 to 6.5.
The latest generation of the main hypervisors has shown, among other things, a renewed and increased focus on security, with the most visible feature being VM encryption. It’s amazing to see how both VMware vSphere 6.5 and Microsoft Hyper-V 2016, both released in the same year, introduced this feature at the same time. But it’s less of a surprise if you think about all the security issues that IT admins and users are facing lately, with things like ransomware, cryptolocker and other threads.
In this first of a series of posts, we’ll look at the different solutions and some deep dive into the used technologies, and how operations like backups are impacted. In this first post, let’s talk about KMIP.
There has been a lot of discussions about ReFS 3.1 after Veeam released its version 9.5 with support for the block clone API. With this integration between the two product, users can now design a repository that combines the speed of a non-deduplicated array, with some important space savings that usually belongs to those dedicated appliances. We have seen many many discussions in our Veeam forums, and I also published two articles on this topic you may want to read: Windows 2016 and Storage Spaces as a Veeam backup repository and An example for a Veeam backup repository using Windows 2016.
Now that people are starting to use ReFS, another question has risen: which cluster size should I use? 64KB or 4KB?