{"id":24688,"date":"2022-11-01T01:02:09","date_gmt":"2022-10-31T17:02:09","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24688"},"modified":"2022-11-01T01:02:09","modified_gmt":"2022-10-31T17:02:09","slug":"how-veeam-back-up-vmware-virtual-machines","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/how-veeam-back-up-vmware-virtual-machines\/","title":{"rendered":"How Veeam Helps Back up Your VMware Virtual Machines"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24693 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=696%2C364&#038;ssl=1\" alt=\"veeam help backup vmware virtual machines\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n\n<p><span style=\"font-weight: 400;\">F<\/span><span style=\"font-weight: 400;\">or data centers of today, virtualization is the key ingredient to have a cut above the rest. It helps in terms of cost and efficiency to have <a href=\"https:\/\/www.exabytes.sg\/vmware\">virtual machines<\/a> run, over the legacy servers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the current times, virtualization comes as standard.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">From file servers to critical applications and databases, which power the data centers of today, almost everything is virtualized.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Whenever there is a reference to virtualization, one name that stands out would be VMWare.<\/span><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/disaster-recovery\">Veeam<\/a><span style=\"font-weight: 400;\">, is the most attached third-party solution, that is built primarily to backup VMWare data. <\/span><\/p>\n<p>Veeam Backup<span style=\"font-weight: 400;\"> and Replication delivers simple, flexible, reliable and powerful data protection. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This solution also helps eliminate downtime with instant recovery and keeps safe from <a href=\"https:\/\/www.exabytes.sg\/blog\/cyber-threats-you-should-be-aware-and-prevent\/\">cyber threats<\/a> with native immutability and tested backup solution.<\/span><\/p>\n<h2><strong><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignleft wp-image-24698 size-thumbnail\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=150%2C150&#038;ssl=1\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=696%2C696&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=114%2C114&amp;ssl=1 114w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?resize=420%2C420&amp;ssl=1 420w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-logo-image.png?w=1000&amp;ssl=1 1000w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>What is Veeam in simple term?<\/strong><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A single platform for all workloads, application and data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Software defined and infrastructure agnostic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Instant recovery at scale<\/span><\/li>\n<\/ul>\n<h2><strong>How does Veeam Software work?<\/strong><\/h2>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensures the most reliable <a href=\"https:\/\/www.exabytes.sg\/blog\/how-to-protect-against-malware-attack\/\">ransomware protection<\/a><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accelerates the move to a hybrid cloud solution<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Decreases cost and the complexity of the operation<\/span><\/li>\n<\/ul>\n<h2><strong>Key Capabilities of the Veeam software<\/strong><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24695 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=696%2C364&#038;ssl=1\" alt=\"veeam backup application\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-backup-replication.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<h3><strong>1. <a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\">Data backup solution<\/a> is being Fast and Secure<\/strong><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Automate workload backup and discovery across the cloud, virtual, physical and NAS. This is useful for BCP and DR criteria.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Image based backups that help the RPO and RTO for VMs and virtual hardware and OS snapshots.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">100% software -defined and hardware-agnostic solutions for the complete flexibility.\u00a0<\/span><\/li>\n<\/ul>\n<h3><strong>2. <a href=\"https:\/\/www.exabytes.sg\/disaster-recovery\">Data Recovery<\/a> using the backup solution is fast and proven for any scenario<\/strong><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Service level agreements can be achieved with complete and reliable restores with instant recovery<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Full or item-based recovery of OSs, applications, databases, VMs, folders, objects and shares.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recover across multiple platforms and clouds with portable data format.\u00a0<\/span><\/li>\n<\/ul>\n<h3><strong>3. Cloud-Ready &#8211; Speed up your cloud adoption while reducing cost<\/strong><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Centralized AWS, Microsoft Azure and Google Cloud- native <\/span><a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\"><span style=\"font-weight: 400;\">backup solution and recovery<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Policy based tiering of backup and archived data across object storage classes, much needed for the complex applications used the present day.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">AWS Key management service (AWS KMS), Azure Key Vault, &#8211; which automates the authorized entries of the software to process as programmed, immutability, helps keep ransomware out.<\/span><\/li>\n<\/ul>\n<h3><strong>4. Data Security &#8211; Protect against ransomware and cyber threats\u00a0<\/strong><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">End-to-End immutability right from the <a href=\"https:\/\/www.exabytes.sg\/about\/datacenter\/malaysia\">data center<\/a> to the cloud for your <\/span><span style=\"font-weight: 400;\">b<\/span><span style=\"font-weight: 400;\">a<\/span><span style=\"font-weight: 400;\">ckup solutions<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create malware-free backups &#8211; thanks to the automatic scans with trusted malware detection.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recover faster than paying a ransom and decryption of your data.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">While we refer to the <\/span><a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\"><span style=\"font-weight: 400;\">backup solutions<\/span><\/a><span style=\"font-weight: 400;\"> all across, it is important to understand the process of backup and restore.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">VMware backup refers to the process of copying data on a Virtual Machine, within a VMware environment to prevent loss of data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We do know of some of the tools used for backup and restore: <\/span><a href=\"https:\/\/www.exabytes.sg\/disaster-recovery\">Veeam backup<\/a><span style=\"font-weight: 400;\"> and Replication, <a href=\"https:\/\/www.exabytes.sg\/acronis\/backup\/server\">Acronis Cyber backup<\/a>, Thin ware backup, are some of the commonly known ones.\u00a0<\/span><\/p>\n<h2><strong>Some of the best practices while using the Veeam Backup:<\/strong><\/h2>\n<h4><b>Prefer the file based backup (VMDK) to Guest Operating System Backup<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Experts prefer to use the file based method to backup Virtual Machines<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The operation is fairly simple and does not impose any performance penalties on the target machine.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is extremely important for high throughput workloads like email servers, databases and applications.<\/span><\/li>\n<\/ul>\n<h4><b>Application consistent backups and VSS<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is recommended to create an application-consistent backup while backing up mission critical VMs that run critical applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This means you should pause applications, a method referred to as \u201cquiescing\u201d, and take measures to ensure that transactions are not lost during the backup solution\u2019s process.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In case of Windows, it is recommended to use the Microsoft Volume Shadow Copy Service (VSS), provided as a part of the VMWare tools to quience applications.\u00a0<\/span><\/li>\n<\/ul>\n<p>Related: <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows-server\/storage\/file-server\/volume-shadow-copy-service\" rel=\"noopener\">What is Microsoft Volume Shadow Copy Service (VSS)<\/a><\/p>\n<h4><b>Provide ample bandwidth and resources for backup<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network bandwidth from the backup server to the backup targets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hardware resources on the backup servers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hardware resources on the backup targets<\/span><\/li>\n<\/ul>\n<h4><b>Do not use VM snapshots as Primary Backups<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">They are very convenient when used to save short term copies of a VM. But they incur a serious penalty on performance.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VM Snapshots require a lot of space and can become bigger than the original disk that is being backed up.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Merging the snapshots back to the VM, is a slow operation and can negatively impact the performance on the machine.<\/span><\/li>\n<\/ul>\n<h4><b>Consider using vStorage APIs<\/b><\/h4>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">vSphere provides vStorage API, that provides programmatic access to a VMDK file for backup and restore.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It gives us features like Chained block tracking<\/span> <span style=\"font-weight: 400;\">incremental backups and de-duplication.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Veeam<\/span><span style=\"font-weight: 400;\"> backups can take up huge amounts of storage space, and setting up on-premise storage infrastructure can be daunting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloudian Hyper Store is an on-premise, enterprise storage solution that is certified for use in VMware environments, and enables easy scalability from hundreds of Terabytes to Exabytes to support any scale of backup data. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is fully compatible with the S3 API. Hyper Store is used in demanding operator-scale deployments using\u00a0\u00a0<\/span><a href=\"https:\/\/cloudian.com\/guides\/vmware-site-recovery-manager\/vmware-cloud-director\/\" rel=\"noopener\"><span style=\"font-weight: 400;\">VMware vCloud Director<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p>Exabytes Singapore offers VMWare superior performance cloud hosting backup delivered via high availability servers built using VMware.<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/vmware\">Automated backup with Veeam<\/a>, automatic failover and fault tolerance built in and a 24x7x365 support team of qualified and experienced engineers make it one of the best backup solutions to purchase for virtual machines.<\/p>\n<p>With features like dynamic load balancing, live migration, high availability firewall security, scalability, security and fully managed backups, <a href=\"https:\/\/www.exabytes.sg\/disaster-recovery\">Veaam<\/a> enables businesses to focus on their core competency and operations while taking care of data backups and securing business critical data in a safe, secure environment to be used on-demand whenever required.<\/p>\n<p>With our <a href=\"https:\/\/www.exabytes.sg\/vmware\">cloud hosting backup plans<\/a>\u00a0with 50 GB disk space and 1 TB high speed data transfer, Exabytes Singapore offers some of the most affordable and reliable cloud backup plans in Singapore.<\/p>\n<p><span style=\"font-weight: 400;\">For more information on these areas, please visit us at <a href=\"https:\/\/www.exabytes.sg\/vmware\">VMware Cloud Singapore<\/a><\/span><\/p>\n<p>Related articles:<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/real-estate-industry-adopt-cloud-solutions\/\">5 Reasons Real Estate Industry Should Adopt Cloud Solutions<\/a><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/cybersecurity-effective-security-tools\/\">5 Most Effective Security Tools for Cybersecurity in Industry 4.0<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For data centers of today, virtualization is the key ingredient to have a cut above the rest. It helps in terms of cost and efficiency to have virtual machines run, over the legacy servers.\u00a0 In the current times, virtualization comes as standard.\u00a0 From file servers to critical applications and databases, which power the data centers [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":24693,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293],"tags":[543,556,463],"class_list":{"0":"post-24688","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"tag-cloud-backup","9":"tag-veeam","10":"tag-vmware"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/11\/veeam-help-backup-vmware-virtual-machines.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6qc","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24688","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24688"}],"version-history":[{"count":4,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24688\/revisions"}],"predecessor-version":[{"id":24702,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24688\/revisions\/24702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24693"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24688"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24688"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24688"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}