Replicate snapshots to a remote cluster from ASA r2 storage systems
Snapshot replication is a process in which consistency groups on your ASA r2 system are copied to a geographically remote location. After the initial replication, changes to consistency groups are copied to the remote location based upon a replication policy. Replicated consistency groups can be used for disaster recovery or data migration.
Snapshot replication for an ASA r2 storage system is only supported to and from another ASA r2 storage system. You cannot replicate snapshots from an ASA r2 system to a current ASA, AFF or FAS system or from a current ASA, AFF or FAS system to an ASA r2 system. |
To set up Snapshot replication, you need to establish a replication relationship between your ASA r2 system and the remote location. The replication relationship is governed by a replication policy. A default policy to replicate all snapshots is created during cluster set up. You can use the default policy or optionally, create a new policy.
Step 1: Create a cluster peer relationship
Before you can protect your data by replicating it to a remote cluster, you need to create a cluster peer relationship between the local and remote cluster.
-
On the local cluster, in System Manager, select Cluster > Settings.
-
Under Intercluster Settings next to Cluster peers select , then select Add a cluster peer.
-
Select Lauch remote cluster; this generates a passphrase you'll use to authenticate with the remote cluster.
-
After the passphrase for the remote cluster is generated, paste it under Passphrase on the local cluster.
-
Select ; then enter the intercluster network interface IP address.
-
Select Initiate cluster peering.
You have peered for local ASA r2 cluster with a remote cluster. You can now create a replication relationship.
Step 2: Optionally, create a replication policy
The snapshot replication policy defines when updates performed on the ASA r2 cluster are replicated to the remote site.
-
In System Manager, select Protection > Policies; then select Replication policies.
-
Select .
-
Enter a name for the replication policy or accept the default name; then enter a description.
-
Select the Policy scope.
If you want to apply the replication policy to the entire cluster, select Cluster. If you want the replication policy applied only to the storage units in a specific storage VM, select Storage VM.
-
Select the Policy type.
Option Steps Copy data to the remote site after it is written to the source.
-
Select Asynchronous.
-
Under Transfer snapshots from source, accept the default transfer schedule or select a different one.
-
Select to transfer all snapshots or to create rules to determine which snapshots to transfer.
-
Optionally, enable network compression.
Write data to the source and remote sites simultaneously.
-
Select Synchronous.
-
-
Select Save.
You have created a replication policy and are now ready to create a replication relationship between your ASA r2 system and your remote location.
Learn more about storage VMs for client access.
Step 3: Create a replication relationship
A snapshot replication relationship establishes a connection between your ASA r2 system and a remote location so that you can replicate consistency groups to a remote cluster. Replicated consistency groups can be used for disaster recovery or for data migration.
For protection against ransomware attacks, when you set up your replication relationship, you can select to lock the destination snapshots. Locked snapshots cannot be deleted accidentally or maliciously. You can use locked snapshots to recover data if a storage unit is compromised by a ransomware attack.
If you want to lock your destination snapshots, you must initialize the Snapshot compliance clock before you create the replication relationship.
Create a replication relationship with or without locked destination snapshots.
-
In System Manager, select Protection > Consistency groups.
-
Select a consistency group.
-
Select ; then select Protect.
-
Under Remote protection, select Replicate to a remote cluster.
-
Select the Replication policy.
You must select a vault replication policy.
-
Select Destination settings.
-
Select Lock destination snapshots to prevent deletion
-
Enter the maximum and minimum data retention period.
-
To delay the start of the data transfer, deselect Start transfer immediately.
The initial data transfer begins immediately by default.
-
Optionally, to override the default transfer schedule, select Destination settings, then select Override transfer schedule.
Your transfer schedule must be a minimum of 30 minutes to be supported.
-
Select Save.
-
In System Manager, select Protection > Replication.
-
Select to create the replication relationship with local destination or local source.
Option Steps Local destinations
-
Select Local destinations, then select .
-
Search for and select the source consistency group.
The source consistency group refers to the consistency group on your local cluster that you want to replicate.
Local sources
-
Select Local sources, then select .
-
Search for and select the source consistency group.
The source consistency group refers to the consistency group on your local cluster that you want to replicate.
-
Under Replication destination, select the cluster to replicate to; then select the storage VM.
-
-
Select a replication policy.
-
To delay the start of the data transfer, select Destination settings; then deselect Start transfer immediately.
The initial data transfer begins immediately by default.
-
Optionally, to override the default transfer schedule, select Destination settings, then select Override transfer schedule.
Your transfer schedule must be a minimum of 30 minutes to be supported.
-
Select Save.
Now that you have created a replication policy and relationship, your initial data transfer begins as defined in your replication policy. You can optionally test your replication failover to verify that successful failover can occur if your ASA r2 system goes offline.
Step 4: Test replication failover
Optionally, validate that you can successfully serve data from replicated storage units on a remote cluster if the source cluster is offline.
-
In System Manager, select Protection > Replication.
-
Hover over the replication relationship you want to test, then select .
-
Select Test failover.
-
Enter the failover information, then select Test failover.
Now that your data is protected with snapshot replication for disaster recovery, you should encrypt your data at rest so that it can't be read if a disk in your ASA r2 system is repurposed, returned, misplaced or stolen.