Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Hyper V and HRL files

Home Forums Virtualization Microsoft Hyper-V Technology Hyper V and HRL files

Viewing 1 post (of 1 total)
  • Author

  • fwilburn

    I have been running 2012R2 Hyper-v for several months. I have been using the Replica functionality from day 1. I have 18 VMs running on 3 different servers, 4 VMs on one, 5 VMs on another and 9 VMs on another. All host servers and VMs are running 2012R2. I have NIC teams on each server. Each server has 64Gb of RAM. This is a small shop, so I am the only IT person here. I use Symantec BUE 2014 with the Hyper-v option, Shavlik Patch Management and Protect and Condusive V-locity. Everything has been running fine. Replications are fast and take just seconds.

    I decided to use Extended Replication over a WAN for a Disaster Recovery solution. I have a 10Mb pipe to a local server farm. All of the servers replicate fine. But…

    A couple of times a day, each VM replicates a large HRL file, anywhere from 1.2Gb to 2.3Gb in size. When the replication was local, this was not a problem and pretty much unnoticed by me. When the Extended Replica tries to replicate this large HRL file over the WAN, as you can imagine, everything goes to a crawl.

    I have looked through Task Scheduler, Event logs, files, etc. trying to find what is causing this large file to develop. I have excluded files from virus scanning, removed patch scanning, removed disk defrag, basically about everything I can think of. Can anyone think of what to do next? Any place to look? Anything? Any ideas are welcome.

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: