You are here: Workload protection > Virtual machine protection > Protect an entire physical or virtual machine using an ESX virtual machine > Selecting volumes to protect for virtual ESX target workloads

Selecting volumes to protect

If you have not done so already, launch the Double-Take Availability Virtual Recovery Assistant console.

Select the volumes you want to protect to the target virtual machine. By default, the system volume will be selected.

Note:N

  • Virtual Recovery Assistant can protect a maximum of 14 source volumes per SCSI controller installed on the Virtual Recovery Appliance virtual machine. Consult your VMware ESX documentation to determine how to install additional SCSI controllers on the Recovery Appliance.
  • Virtual Recovery Assistant supports replication of junction points specific to domain controllers only. Any user-created junction points will be replicated as two unlinked copies of the data.

You can specify the size of the selected volume on the replica virtual machine.

  1. Select the name of the volume in the Volume table.
  2. Enter a value in the Size of the selected volume on the replica virtual machine field.
Note: If the size of the virtual disk on the replica is identical to the size of the disk on the source and the source has less than 20 MB of disk space remaining, you may run out of disk space on the replica due to differences in how the virtual disk's block size is formatted. To avoid this issue, create a virtual disk with at least 20 MB more disk space than the amount of data that will be mirrored to it.
  1. Use the drop-down box to select whether the value is in MB or GB.
  2. After you have entered information for the selected volume, click Update.
  3. Repeat this process to configure the size of additional volumes on the replica virtual machine.
  4. To exclude a path or folder from the protection, type the path to exclude in the Exclude these paths field, then click Add.
  5. To remove a path from being excluded, select the path, then click Remove.
  6. When you are finished selecting the data to protect, click Next.

Next step: Select target server