For flawless and non-disruptive recovery operations, you can follow certain best practices based on industry expertise and previous successful experiences.
Operation |
When or How Often |
Description |
---|---|---|
Schedule snapshots of protection groups. |
|
Use multiple schedules to build recovery point depth without excessive recovery point count and to avoid introducing excessive change for older recovery points. See Snapshot Scheduling Best Practices in the VMware Live Cyber Recovery documentation. Use high-frequency snapshots. See High-Frequency Snapshots in the VMware Live Cyber Recovery documentation. To avoid job queuing, reduce other replication loads and distribute jobs evenly over time. As a best practice for ransomware recovery, configure snapshot schedules with a retention of at least 90 days. However, a 90-day retention schedule might result in higher storage capacity consumption. See Snapshot Retention in the VMware Live Cyber Recovery documentation. |
Create or update recovery plans. |
|
See Set Up Recovery Plans in VMware Live Cyber Recovery in the VMware Live Cyber Recovery documentation. |
Test recovery plans |
|
See Running a Test Failover Recovery Plan and Test Failover Example in the VMware Live Cyber Recovery documentation. |
Configure user access management. |
|
|
Restrict network connectivity. |
|
In protected sites, VMware Live Cyber Recovery connectors only need specific port and destination access. Outbound connection from the connectors in the VMware Cloud Foundation instance requires only port 443. See VMware Live Recovery port list in the VMware Ports and Protocols portal. |