4.1
Table Of Contents
- Site Recovery Manager Administration Guide
- Contents
- About This Book
- Administering VMware vCenter Site Recovery Manager
- Installing and Updating Site Recovery Manager
- Configuring the Protected and Recovery Sites
- Test Recovery, Recovery, and Failback
- Customizing Site Recovery Manager
- Assign Roles and Permissions
- Customizing a Recovery Plan
- Configure Protection for a Virtual Machine or Template
- Configure SRM Alarms
- Working with Advanced Settings
- Avoiding Replication of Paging Files and Other Transient Data
- Troubleshooting SRM
- Index
Configuring the Protected and
Recovery Sites 3
After you have installed SRM at the protected and recovery sites, you must connect the two sites to create a
site pair, configure the array managers at each site, and configure SRM at each site. You use the SRM client
plug-in to administer SRM. Site pairing requires vSphere admnistrative privileges at both sites.
Prerequisites
Before you can connect the protected and recovery sites, you must:
1 Install an SRM server at each site.
2 Install the appropriate storage replication adapters on the SRM server hosts at both sites. The recovery
site must be the replication target of arrays managed by the SRA at the protected site.
3
Download the SRM plug-in from an SRM server into the vSphere client that you want to use to administer
SRM.
This chapter includes the following topics:
n
“Create a Site Pair,” on page 29
n
“Install the SRM License Key,” on page 30
n
“Configure Array Managers,” on page 31
n
“Configure Inventory Mappings,” on page 33
n
“Create Protection Groups,” on page 35
n
“Create a Recovery Plan,” on page 37
Create a Site Pair
Before you can use SRM, you must designate the protected site and the recovery site and connect them. The
sites must authenticate with each other.
Prerequisites
Before you can connect the protected and recovery sites, you must install an SRM server at each site, then install
and enable the SRM plug-in at a vSphere client from which you want to administer SRM.
NOTE If you are using credential-based authentication, several of the steps in this procedure produce certificate
warnings. For more information about these warnings and options for dealing with them, see “SRM
Authentication,” on page 15.
VMware, Inc. 29