Managing Zerto: Setup, Protection, and Recovery

H61K2S

Course ID

H61K2S

Duration

2 days

Format

ILT/VILT

Overview

This course prepares beginner to intermediate Zerto users to deploy, configure, and manage the solution in VMware vSphere® environments. It is ideal for hands-on practitioners, and the training focuses on core concepts and components with Zerto, including material on the major recovery operations such as failovers, tests, and restores. Hands-on labs are included to give learners firsthand experience with setup and protection, plus instant recovery from ransomware after a simulated infection.

Course ID

H61K2S

Duration

2 days

Format

ILT/VILT

  • Audience

    This course is ideal for Zerto customers and Zerto Partners.

  • Prerequisites

    No prior Zerto experience is required. However, before attending this course, you should have an understanding of VMware vSphere and virtualization technologies.

  • Objectives

    After completing this course, you should be able to:

    • Articulate the top use cases Zerto supports and what architectures are needed for each use case
    • Describe the major Zerto components and how they interoperate
    • Install, set up, and configure Zerto in a VMware vSphere environment
    • Protect virtual machines replicating locally and to a secondary peer site
    • Perform the most common recovery operations, including file restores, failover tests, live failover, and moves
  • Course outline

Module 1: Zerto Overview

  • Define the Zerto platform
  • Explain Zerto platform functionalities and advantages
  • Zerto components
  • Zerto use cases
  • Complete data protection with Zerto and HPE

Module 2: Two Driver Options

  • Name the two driver options
  • Describe which driver option offers a signed VMware vSphere Installation Bundle (VIB)

Module 3: Zerto Virtual Manager Appliance (ZVMA)

  • Define Zerto Virtual Manager Appliance (ZVMA)
  • Requirements
  • Resources

Module 4: Virtual Replication Appliances

  • Virtual Replication Appliance (VRA) overview
  • What Is a VRA?
  • VRA deployment
  • VRA: source versus target summary
  • VRA helpers overview
  • VRA setup and load balancing
  • VAIO mode uninstall flow
  • Uninstall VRAs and I/O filters

Module 5: VAIO

  • What is VMware vSphere APIs for I/O filtering (VAIO)
  • Caveats of Zerto VAIO mode
  • VMware software acceptance level
  • Configure with VAIO enabled
  • Install VRAs and I/O filters
  • Turn on workload automation
  • Zerto storage policies
    • Zerto default policy
    • Zerto default vSAN policy
    • Assigning policies
  • Deployment considerations for ZVM appliances

Module 6: Zerto Architectures

  • Basic on-premises architecture
  • Operational recovery architecture
    • Local, same-site replication with optional offsite copy
  • Disaster recovery architecture
    • Replication to remote site for classic DR
  • DR with extended journal copy architecture
    • Remote DR with additional copy on the DR site or sent to the cloud
  • Operational recovery and DR architecture
    • Local replication plus DR site and additional copy from both

Module 7: Public Cloud Architectures

  • Disaster recovery to the cloud
    • Cloud native architecture
    • Continuous DR architecture to AWS
    • Zerto for Azure architectures: hybrid to cloud
  • Disaster recovery in the cloud
    • Why Zerto for native cloud workloads
    • Zerto for Azure architectures: multiregion
    • Zerto in-cloud for AWS
    • Global disaster recovery

Module 8: Zerto Journal

  • Journal-based recovery
  • Journal technology
  • Journal settings and sizing
    • Journal history
    • Journal size hard limit
    • Journal sizing: I/O considerations
    • Estimating journal size

Module 9: Zerto Replication

  • Zerto replication overview
  • What Is a checkpoint?
  • What is write-order fidelity?
  • Journal
  • Types of sync
  • Replication:
    • Initial sync
    • Bitmap sync
    • Delta Sync

Module 10: Virtual Protection Groups (VPG)


  • Virtual protection group (VPG) overview
  • Consistent protection and recovery
  • Creating VPG: four main options
  • Three types of VPGs
    • Remote DR and continuous backup VPG
    • Local continuous backup VPG
    • Data mobility and migration VPG
  • VM auto-protect
  • VPG replication prioritization overview
  • One-to-many overview
  • Exclude disks
  • VPG considerations
  • Assign Zerto storage policies

Module 11: Real-time Encryption Detection

  • Anatomy of an attack
  • Backup-based detection is inadequate
  • Earliest warning when an attack is occurring
  • Replicate and detect
  • Zerto resilience observation console
  • Encryption analyzer
    • Collection phase
    • Inspection phase
    • Reaction phase
      • Alerting
      • Tagging
      • User response
  • Considerations

Module 12: File and VM Restores

  • Instant restores of files, folders, and VMs
  • Instant file/folder restores
  • Recovery operations: file restore
  • Restore limitations
  • File restore process
  • Instant VM restores

Module 13: Recovery Concepts

  • Recovery operations: key concepts
  • Scratch disk size and location
  • Commit overview
  • Commit policies
    • None
    • Auto-commit
    • Auto-rollback
  • Commit policy considerations
  • Reverse protection overview
  • VM shutdown options

Module 14: Recovery OperationsFailover Test

  • Failover test overview
  • Failover test process
  • Recovery report
  • Alternative uses for the failover test

Module 15: Recovery OperationsLive Failover

  • Live failover overview
  • Failover live: pre-commit
    • 1. Source VMs power down
    • 2. Failed over VMs power up
    • 3. VMs read from journal and replicas
    • 4. VMs write to scratch journals
  • Failover live: commit
    • 1. Data promoted to VM disks from scratch disks
    • 2. Scratch disks and journals removed
    • 3a. With reverse protection, replicate back to original source
    • 3b. Could instead fail back if so desired
  • Before your first live failover

Module 16: Recovery OperationsMove

  • Move operation
    • 1. User or script initiates move
    • 2. Production VMs are shut down; uses last checkpoint so RPO = zero
    • 3. Pre-commit VMs are created and powered on
    • 4. User or script commits operation; data promotes
  • Move parameters: keep source VMs
  • Move versus failover

Module 17: Recovery OperationsClone


  • Creating an offsite clone
    • 1. Select the VMs to clone
    • 2. Select the journal checkpoint to use
    • 3. Select which site and datastore to clone to
    • 4. Clones come up as powered off VMs with a checkpoint timestamp

Module 18: Zerto Extended Journal Copy


  • Zerto extended journal copy overview
  • Extended journal copy
    • Architecture
    • Repository
    • Disk objects map
    • Scale-out: write
  • Continuous data protection with extended journal copy
  • Extended journal copy scale-out: read
  • Recovering across the short and long term

Module 19: Module Zerto Analytics


  • Zerto analytics
    • Full reporting suite
    • Enabling Zerto analytics
    • Secure architecture
  • Resource planner
    • Process
    • Requirements
  • Zerto Analytics API

Module 20: Upgrade


  • Zerto release features
  • Zerto version 10 update 6
  • Interoperability between versions
  • Upgrading Zerto

Module 21: Additional Zerto Products


  • Zerto Cyber Resilience Vault
  • Zerto Cloud Manager (ZCM)
    • Considerations for ZCM
    • ZCM installation on Windows
  • Zerto Self-service Cloud Portal (ZSSP)

5 reasons to choose HPE as your training partner

  1. Learn HPE and in-demand IT industry technologies from expert instructors.
  2. Build career-advancing power skills.
  3. Enjoy personalized learning journeys aligned to your company’s needs.
  4. Choose how you learn: in-person, virtually, or online—anytime, anywhere.
  5. Sharpen your skills with access to real environments in virtual labs.

Explore our simplified purchase options, including HPE Education Learning Credits.

  • Lab outline

Exercise 1: Introduction

Exercise 2: Deploy the Zerto Virtual Manager Appliance (ZVMA) from OVF

Exercise 3: Configure the ZVMA

Exercise 4: License and Pair Zerto Sites

Exercise 5: VRA Installation

Exercise 6: Create a Virtual Protection Group

Exercise 7: Create Local Virtual Protection Group

Exercise 8: Copy a Virtual Protection Group

Exercise 9: Edit a Virtual Protection Group

Exercise 10: Restore Files and Folders After a Ransomware Attack

Exercise 11: Failover Test

Exercise 12: Perform a Live Failover

Exercise 13: Perform a Move Operation

Exercise 14: Create an Extended Journal Repository

Exercise 15: Edit VPG to Enable Extended Journal Copies

Exercise 16: Using the Clone Operation

Exercise 17: Using the Zerto REST API

Exercise 18: Using VMware Host Tags

Recommended for you