How does Hyper-V Replica work and why is it important?
Hyper-V Replica is a disaster recovery feature that creates and maintains copies of virtual machines. The process of creating a replica involves the use of a primary host and a secondary host. When a replica is created, the VSS writer (a mechanism for creating application-consistent backups) creates a snapshot of the virtual machine on the primary host. The Replica function then copies the snapshot to the secondary host. That way, the organization has a standby server containing copies of its virtual machines, which are ready to be used at a moment's notice.
One of the most important things about the Hyper-V Replica feature is that it is designed solely as a disaster recovery feature and not a resiliency feature. If the primary server were to fail, Hyper-V does not automatically fail the virtual machines over to the replicas (for that, you would use failover clustering). Instead, Hyper-V Replica is a mechanism that allows virtual machine recovery to be easily delivered after a storage failure or other type of disaster.
It is worth noting that the replication process does not occur in real time; instead, it is asynchronous and is based on log shipping. This process occurs at five-minute intervals and is not configurable.
Creating Hyper-V replicas does not require that the primary host and the secondary host have identical hardware, but the secondary host must meet some minimal standards. Specifically, the secondary server must have enough memory, storage space and processing power to host the replicated virtual machines. And although it's not always an absolute requirement, the secondary server should ideally contain the same type of processor as the primary host to avoid compatibility problems.
Dig Deeper on Disaster recovery storage
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.