So the first Southwest Ontario Veeam User Group meeting is in the bag. A big thank you to everyone that came out. Also, a big thank you to all the support that I have received from Veeam. In particular Paula Melvin, David Sayavong, and Bob Scott.
I wanted to post a quick recap of the event as there were some folks who let me know ahead of time that they could not make it. In no particular order (largely due to my poor memory), a few of the topics we covered were:
- Veeam Quick Migration – A free tool to migrate VMs from one host to another. This is perfect for when Storage vMotion isn’t available and cold migration is not an option.
- Extract Utility – A handy utility that can extract VMs from a full backup file (VBK). This would be handy in cases where you have a backup file but don’t have access to a Veeam server. It might be useful if your virtual Veeam server is down and you need to recover it. Or if you are offsite somewhere going through archived files.
- Veeam One – We discussed how this reporting and monitoring tool can be used in a variety of ways. It is useful for sizing your environment and pinpointing culprit problems.
- The Restore Point Simulator tool – A calculator used to help you size your repository. It is based on backup types, retention points, frequency, etc. Note that this is not a Veeam tool, but handy none-the-less
- Veeam Endpoint – We had some good discussion around this free tool and how some folks are using it.
- Cryptolocker – We touched on this a couple of times – it does seem to be pretty high on the ‘fear list’. I had mentioned a GPO that can be used to severely cut down on the threat vector. You can find those details here, specifically # 7: http://blog.matrixforce.com/2015/03/04/cryptolocker-prevention-top-12-defenses-against-business-loss/
- vSphere Tags – Using vSphere tags to automatically populate jobs in Veeam. A good usage is when assigning SLA values to VMs.
I also presented Veeam Repository Best Practices which spurred a lot of questions. A copy of that slide deck is available below (or can be downloaded here). Be sure to check out the links in the last slide. The first link is the presentation that I obtained a lot of this information from.
In contrast to my presentation, David presented Veeam Worst Practices. I think most of us were just glad to see that we didn’t blatantly fall into any of profiles.
With the first meeting in the bag, I’ll start working on the second meeting. If you have any suggestions or feedback, please reach out. This is a user-driven event, so let me know what you want to see, or even better, if you have a topic you would like to present on.
One of the primary goals of the group is to spread knowledge – I would like to think that we did a pretty good job of that today. Thanks again.2016-02-Veeam-Repository-Best-Practices