Avoiding downtime with VMware Fault Tolerance and High Availability
A comprehensive collection of articles, videos and more, hand-picked by our editors
VMware Fault Tolerance creates a duplicate of a selected workload that runs on a different host server within a...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
cluster. This establishes two working versions of the same workload. Activity logs track inputs, storage activity and other actions, which are shared with the duplicate VM; logging keeps the original and duplicate VMs synchronized.
Normally, when a VM fails, it has to be restarted or restored from a snapshot, possibly resulting in data loss. With fault-tolerant VMs, a problem detected with the original VM would cause the application to fail over automatically to the duplicate VM, which would assume control with no loss of data or disruption to the user. Also, the fault-tolerance feature will create a duplicate VM on another available host server to maintain availability.
It's important to note that host-server selection is fixed within a server cluster. Server selection is intended to be flexible: Once a duplicate VM takes over, it becomes the new original VM and the newly created duplicate becomes the backup VM. If the original server becomes available later, it returns to the server pool and can be used at another time to host duplicate VMs as needed. The arrangement will not revert to some pre-established server selections. Still, it is possible to migrate original and duplicate VMs to preferred servers using tools like vMotion or Distributed Resource Scheduler.
A similar behavior occurs when the duplicate VM's server encounters a problem: A new duplicate VM is established on another available server within the cluster. This poses no disruption for the original (unaffected) VM.
Related Q&A from Stephen J. Bigelow
One size does not fit all when administrators develop a protection policy for specific applications. Learn about the configuration options in System ...continue reading
Set up and operate a VM network using proven strategies to ensure security and performance. With a little planning, virtualization admins can avoid ...continue reading
Virtual switch security is achieved through a number of features. Virtualization admins can create and enforce policies, lock down MAC addresses and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.