Silverlight Authors: Steven Mandel, Gerardo A Dada, Srinivasan Sundara Rajan, Yeshim Deniz, Greg O'Connor

Blog Feed Post

31 Days of our Favorite Things: Windows Server 2012 and Hyper-V Replica (Part 5 of 31)

Hyper-V POWER!

Hyper-V in Windows Server 2012 (and in the free Microsoft Hyper-V Server include an easy start to a good disaster recovery solution: Hyper-V Replica.  With Hyper-V Replica you can easily create and maintain an off-line copy – a replica – of a virtual machine on a separate virtualization host.  This means, for example, that if your main location or host for an important virtual machine goes down becomes unavailable, you can easily fail-over to the replica.  The copy will start up and be available in short-order.

“That sounds really great, Kevin!  But what does it cost to set this up?”

Absolutely nothing, other than what you’ve already paid for (the OS).  Hyper-V Replica is just a capability that is included with Windows Server 2012 Hyper-V and Hyper-V Server

“How do I set it up?”

I’m glad you asked.  There are really two simple requirements to make it happen:

  1. You need to be running Windows Server 2012 with the Hyper-V Role installed (or Microsoft Hyper-V Server 2012) on both the source and destination virtualization hosts, and
  2. You need network connectivity between them.  (and don’t  forget the firewall)

Here are my 6 steps to working with Hyper-V Replica:

1. Configuring the Hosts to Allow Replication

In Hyper-V Manager, right-click on, or select the host, and choose Hyper-V Settings…

On the left, select Replication Configuration, and then enable and configure your replication options.


2. Setting up a Replica

To configure the replica using Hyper-V Manager, right click on the VM you want to replicate and choose Enable Replication…

Enable Replication...

On the Before You Begin page, click Next

On the Specify Replica Server page, Enter the name of the server that is to be the replication host.

Specify Replica Server

Click Next.

The Specify Connection Parameters page is, um, where you specify your connection parameters.

Specify Connection Parameters

Click Next.

Choose the hard disks you want to replicate on the Choose Replication VHDs page.

Choose Replication VHDs

Click Next.

On the Configure Recovery History page, choose whether you want to keep just the most recent recovery point, or perhaps maintain a number of points in the past that you could recover to.  You also have the option to occasionally perform a VSS copy.

Configure Recovery History

Click Next.

On the Choose Initial Replication Method page, notice that you have options on how you want that big initial replication to take place.  Maybe you don’t want to use the network for that initial large transfer, but instead would prefer to use UPS or FedEx.

Choose Initial Replication Method

Then click Finish on the summary page, and you’re all set.


If all was configured properly, you’ll see a new VM appear on the replication host that will be turned off.

3. Verifying the Replica’s Status

You can easily verify the status of your replica by selecting either your original VM or your replica VM in Hyper-V Manager, right-click the VM, click Replication, and then View Replication Health.

View Replication Health

Replication Health

4. Testing the Replica

You can test your replicated machine by right-clicking on the replica VM and under Replication select Test Failover…

Test Failover

Pick the point in time that you want to test, and click Test Failover.

Test Failover

This will create a linked copy VM with the text “ – Test” appended to the name.  Simply start up that VM (go ahead.  It isn’t connected to the network, so it won’t interfere with anything) and verify that it is a useable machine.

5. Disaster Strikes!  Time to Fail Over

The unthinkable has happened.  Time to act.  Your original and important production VM is no longer available.

On the replica VM, right click.  Under Replication, select Failover.


Select the recovery point, and click Fail Over.


And your replica will start up configured, networked, and ready to take on Dr. Proton.

Recovered VM

6. Removing the Replica

Easy.  On both the source and replica VMs, right click.  Under Replication, select Remove Replication


Now you can safely delete your replica from the replication host.


Simple, yes?  Do you have any questions?

“Can I have the failover happen automatically?”

Not natively.  In its most simple form, Hyper-V Replica is a manual failover.  However, because you can use PowerShell to drive this entire process, there’s no reason why you (or some third party) couldn’t develop a solution that monitors the state of the source VM and launches a script (or some automation in System Center 2012 Orchestrator) to launch the failover.

“But do I need to have Active Directory?  Or do both of my virtualization hosts need to be in the same domain?”

Actually, no.  You have the option of using certificate authentication to make the trusted configuration.  (CLICK HERE for details on how to use certificates for Hyper-V Replica.)

“Do my virtual machines need to be running particular operating systems for this to work?”

Nope.  There is nothing required of the guest operating system.  You could be running the original Duke Nukum on DOS 6.22 in your VM, and this will still work.

“I’ve heard good things about using Windows Azure for hosting my virtual machines and extending my datacenter into the cloud.  Can I create my replica up in my Windows Azure account?” 

Currently the answer to that is no.  But I’ve heard this question enough times, and really it does make sense.. so I have to imagine (and that’s all I personally have to go on) that Microsoft is considering doing that.  Consider the ramifications, though… setting up a replica means configuring something beyond just standing up a virtual machine in Hyper-V.. so the process has to have the ability to manipulate the hypervisor.  I could see it happening sometime, but I don’t know when.

“Can I replicate machines that are in clusters?  And can I replicate into or out of another cluster?”

Yes and yes.  You will think of the cluster as and treat it as a single machine.  And to do that there is a special role that you need to add to the cluster called the Hyper-V Replica Broker.  This defines a new named entity that becomes either the source or the destination for replicas coming into or out of a cluster.   For more details on this, check out this Wiki article.

“What about PowerShell?  Can I use PowerShell to set up a replica?  Can I use it to do the failover or even get status on current replicas?”

Yes, yes, and yes. 

For example, to configure the replica destination host, you could use these commands to configure the firewall to allow inbound replication on the destination, and set a server up as a new replication host (each numbered line is a separate complete PowerShell command or script line):

  1. Enable-Netfirewallrule -displayname "Hyper-V Replica HTTP Listener (TCP-In)”
  2. Import-Module Hyper-V
  3. $RecoveryPort = 8080
  4. $ReplicaStorageLocation = “D:\Example”
  5. Set-VMReplicationServer -ReplicationEnabled $true -AllowedAuthenticationType Kerberos -IntegratedAuthenticationPort $RecoveryPort -DefaultStorageLocation $ReplicaStorageLocation -ReplicationAllowedFromAnyServer $true

And then to create a replication (each numbered line is a separate complete PowerShell command or script line):

  1. Import-Module Hyper-V
  2. $ReplicaServer = “Recovery1.contoso.com”
  3. $RecoveryPort = 8080
  4. $PrimaryVM1 = “CRMVM”
  5. $PrimaryServer = “Primary1.contoso.com”
  6. Enable-VMReplication -VMName $PrimaryVM1 -ReplicaServerName $ReplicaServer -ReplicaServerPort $RecoveryPort -AuthenticationType Kerberos -CompressionEnabled $true -RecoveryHistory 0
  7. Start-VMInitialReplication –VMName $PrimaryVM1

For the full story, here is the Microsoft online documentation of  Hyper-V Replica: Hyper-V Replica Overview - http://technet.microsoft.com/en-us/library/jj134172.aspx 
(NOTE: as of today, the online documents are still based on the RC code.  I’m sure it will be updated soon to work with RTM.)

And to give Windows Server 2012 a try,


So what do you think?  Good stuff?  Let’s discuss in the comments.

Read the original blog entry...

More Stories By Kevin Remde

Kevin is an engaging and highly sought-after speaker and webcaster who has landed several times on Microsoft's top 10 webcast list, and has delivered many top-scoring TechNet events and webcasts. In his past outside of Microsoft, Kevin has held positions such as software engineer, information systems professional, and information systems manager. He loves sharing helpful new solutions and technologies with his IT professional peers.

A prolific blogger, Kevin shares his thoughts, ideas and tips on his “Full of I.T.” blog (http://aka.ms/FullOfIT). He also contributes to and moderates the TechNet Forum IT Manager discussion (http://aka.ms/ITManager), and presents live TechNet Events throughout the central U.S. (http://www.technetevents.com). When he's not busy learning or blogging about new technologies, Kevin enjoys digital photography and videography, and sings in a band. (Q: Midlife crisis? A: More cowbell!) He continues to challenge his TechNet Event audiences to sing Karaoke with him.

@ThingsExpo Stories
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
Although it has gained significant traction in the consumer space, IoT is still in the early stages of adoption in enterprises environments. However, many companies are working on initiatives like Industry 4.0 that includes IoT as one of the key disruptive technologies expected to reshape businesses of tomorrow. The key challenges will be availability, robustness and reliability of networks that connect devices in a business environment. Software Defined Wide Area Network (SD-WAN) is expected to...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...