Information Technology Reference
In-Depth Information
vSphere HA provides greater protection against outages due to network partition or network
isolation.
This part of the vSphere HA coni guration allows you to specify which datastores should be
used by vSphere HA for heartbeating. Figure 7.25 shows the Datastore Heartbeating section of
the Edit Cluster dialog box.
Figure 7.25
Select the shared
datastores that
vSphere HA should
use for datastore
heartbeating.
vSphere HA provides three different settings for how the administrator can inl uence the
selection of datastores for heartbeating:
The i rst option, Automatically Select Datastores Accessible From The Host, disables the
manual selection of datastores from the list. With this option, any cluster datastore could
be used by vSphere HA for heartbeating.
The second option, Use Datastores Only From The Specii ed List, constrains vSphere HA
to using only those datastores selected from the list of datastores. If one of those datastores
becomes unavailable for whatever reason, vSphere HA will not perform heartbeating
through a different datastore.
The last option is Use Datastores From The Specii ed List And Complement Automatically
If Needed. This is a bit of a blend of the previous two options. With this option, the admin-
istrator selects the preferred datastores that vSphere HA should use. vSphere HA chooses
from among the datastores in that list. If one of the datastores becomes unavailable,
vSphere HA will choose a different datastore, until none of the preferred datastores are
available. At that point it will choose any available cluster datastore.
The last option is probably the most l exible, but how would you know which datastores were
being used by vSphere HA? In the next section, “Managing vSphere High Availability,” we'll
show you how to tell which datastores vSphere HA is actually using for datastore heartbeating
as well as how to determine the slot size, see any cluster coni guration issues, and gather infor-
mation on the total number of protected and unprotected VMs.
Search WWH ::




Custom Search