I can't afford to build a failover cluster. Are there any other options for providing fault tolerance?
Historically, the only way to make Microsoft Hyper-V virtual machines fault tolerant was to build a host server cluster. The problem with using failover clustering was that it required the use of a Cluster Shared Volume (CSV), which is expensive, to say the least. This requirement put Hyper-V clustering beyond the financial reach of many small and medium-sized businesses.
Windows Server 2012 offers some lower cost alternatives to traditional Hyper-V clustering. One of the biggest changes that Microsoft has made in the new version is to remove the requirement for clusters to depend on a CSV. It is now possible to build a failover Hyper-V cluster without using shared storage. All you need is enough local storage in each cluster node to accommodate the VMs.
Another option is something called Microsoft Hyper-V Replica. Replication is similar to clustering, but it isn't a true clustering solution. When Hyper-V Replica is enabled, VMs (or rather the virtual hard drives that make up the VMs) are replicated from one Hyper-V host to another. The replica doesn't provide the same level of failover protection that a true cluster does, but you can manually perform both planned and unplanned failovers.
Another nice thing about the Hyper-V Replica feature is that you can create replicas using a minimum of two servers (a source server and a target server). Failover clusters require a minimum of three servers (either three cluster nodes or two cluster nodes and a file share witness). Being able to create a replica based on only two servers helps to reduce costs compared to failover clustering.
New VM replication tool for IT shops
Disaster recovery options for SMBs
Hyper-V Replica takes center stage at WPC 2011
Dig Deeper on Disaster recovery, failover and high availability for virtual servers
Related Q&A from Brien Posey
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems ... Continue Reading
Hackers can gain remote access to users' desktops through RDP hijacking. As a result, IT pros must know what they can do to prevent such an attack. Continue Reading
When IT pros are seeking an alternative to Outlook, they should consider the features their users need the most and select an email client that best ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.