One of the most common question I receive in regard to Veeam Cloud Connect, is “What’s the size I should configure for my Veeam server”? Usually, we answered this question using our sizing tools and our best practices, but lately I found a different and probably even better answer, thanks to our big data.
Learn how to install manually the Veeam Service Provider Console managementagent on a Veeam Cloud Connect server.
Last week, Veeam released the new Veeam Service Provider Console v4, the latest version of what was previously called Veeam Availability Console. I run my own VAC (now VSPC) environment, so I decided to take the opportunity to upgrade my lab to the latest version to learn the upgrade process.
For a new chapter of my book on Veeam Availability Console, I created a second virtual datacenter and I needed to connect the two of them together with a vpn. I have many options, like using the embedded ipsec capabilities of the NSX Edge i have at both sites, as they both run vCloud Director, but I decided to use Veeam Powered Network, in order to use this opportunity to learn more about it. And the first thing I’ve learned was how to configure the appliance with a static IP address.
The beginning of each year, lately seems to be the time when I have to update my scripts that control the automatic management of SSL certificates. I started three years ago by learning first about Let's Encrypt certificates, and how they could have solved my needs for automatically renew (for free!) my SSL certificates. At the time I started to use ACMESharp: it seemed to be a great fit as it worked in powershell and had all the features I needed; but lately, it has lagged behind, and the move the ACME v2 was the final nail in its coffin.
Last week, I explained how to manually connect standalone computers to Veeam Availability Console. This time we will try to automate this process as much as possible.
In my previous post, I talked about Veeam N2WS Backup and Recovery (known previously as CPM) and how to configure it to protect different AWS accounts. Now that the configuration is ready, it’s time to protect the virtual machines, and to export them into S3 so that we can have an offsite copy using Veeam Backup & Replication.
One of the main focus of this year for me as a cloud architect at Veeam, is to learn as much as possible about public cloud technologies, and how our software solutions can interact with them. I started a few weeks ago to deep dive into our solutions for Amazon Web Services, using N2WS Backup & Recovery. One of the things I’ve learned is how to create a dedicated account to protect other accounts.