It is assumed that the following tasks have been performed:
- The Protector Master software has been installed and licensed on a dedicated node.
- The Protector Client software has been installed on all nodes of the Hyper-V setup which should be protected.
- The Protector Client software has been installed on the node that will act as a proxy for the Hitachi storage device where the Hyper-V data is located. Note that for a Thin Image snapshot, the source and destination LDEVs are located on the same device
- The block storage device has been set up as per the Protector requirements and prerequisites. Refer to Hitachi Block prerequisites.
- Permissions have been granted to enable the Protector UI, required activities and participating nodes to be accessed. In this example all nodes will be left in the default resource group, so there is no need to allocate nodes to user defined resource groups.
- A Hyper-V user has been created that provides the required privileges as detailed in Microsoft Hyper-V user privileges. This user will be required when creating the Hyper-V node in the steps that follow.
This task describes the steps to follow when snapshotting VMs that reside on a Hitachi Block storage device. The data flow and policy are as follows:
Figure. Hyper-V Block Snapshot Data Flow
Classification Type | Parameters | Value |
---|---|---|
Hyper-V | Include / Exclude | Refer to About Hyper-V policy classifications for details on how to specify VMs that are to be included in a backup. |
Virtual Machine Consistency | Application consistent checkpoints. |
Operation Type | Parameters | Value | Assigned Nodes |
---|---|---|---|
Snapshot | Mode | Hardware | Hyper-V application node |
Hardware Type | Hitachi Block | ||
Run Options | Run on RPO | ||
RPO | 2 hours | ||
Retention | 2 days |