vSphere SRM 6.X Install and configure – Part 2 – Configure Inventory Mappings

Home / Replication / vSphere SRM 6.X Install and configure – Part 2 – Configure Inventory Mappings

In the previous post we Installed SRM in our lab environment and we also paired the two sites. In this post we will continue with the configuration. If you look at VMware configuration guide the next step is to configure inventory mappings.

With Inventory Mappings we can specify how SRM maps the VM’s resources at the remote site, the idea is that you use inventory mapping to dictate where in the protected site the VM’s will be placed in case of a failure, you can map compute resources, VM folders and networks.

So in the following examples we are going to set the following:

  • Resource Mapping – With resource mappings you can map resource pools, standalone host vApps and clusters, You cannot map individual hosts that are part of a cluster to other resource objects.
  • Folder Mappings – With folder mapping you can map datacenters or VM’s folders on the protected site to the remote
  • Network Mappings – With network mapping you map to which network on the recovery site the VM’s will use.

 

Configuring Inventory Mappings Step by Step:

Resource Mappings:

In the SRM window click on the protected site and then click on step 2.1 “Create resource mappings”

In the create resource mappings window choose your resources and also choose the location on the protected site

If you would like to configure reverse mappings, select the resources on the protected site.

Folder Mappings:

In the SRM window click on the protected site and then click on step 2.2 “Create Folder Mappings”

In the Select Folder Mappings window you can choose auto or manual

Map the folders and click on add mappings

Configure Reserve mappings

Network mappings:

In the SRM window click on the protected site and then click on step 2.3 “Create Network mappings”

Map the network from the protected site to the recovery site.

Select the test network.

Configure reverse mappings.

In the next post we will disucss the next step, which is the configuration of placeholder datastore.

Thanks for reading

Mordi.

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *