Skip to content

Guide Creation - Move2cloud vmware zerto Sk-2221 #8139

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 18 commits into from
Jul 17, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Original file line number Diff line number Diff line change
@@ -0,0 +1,340 @@
---
title: Move2Cloud - Migrate VMware workloads to OVHcloud Hosted Private Cloud with Zerto
excerpt: "Learn how to migrate your on-premises VMware workloads to an OVHcloud Hosted Private Cloud environment using Zerto Virtual Replication"
updated: 2025-07-17
---

## Objective

This guide explains how to migrate your on-premises VMware workloads to an **OVHcloud Hosted Private Cloud (HPC)** using **Zerto Virtual Replication**.

> [!primary]
> **This guide applies to standard Hosted Private Cloud environments that are NOT part of SecNumCloud (SNC), PCI-DSS, or HDS-qualified frameworks.**
> If you are using an SNC, PCI-DSS, or HDS-qualified Hosted Private Cloud, some features described here, such as OVHcloud IAM or NSX-T advanced networking, may not be available in SNC environments.
> For SecNumCloud environments, please refer to the dedicated guide:
> [Move2Cloud - Migrating VMware Workloads to SecNumCloud Hosted Private Cloud with Zerto](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/vmware_migration_zerto_secnumcloud)

## Requirements

Before you begin, make sure you have:

- A complete inventory of your VMs, including FQDN, IP address, OS version, and application dependencies.
- A batch migration plan grouped by application stack.
- A full list of VLANs, subnets, and segments for your target network.
- An HPC environment properly sized (hosts, datastores, vSAN, NSX-T).
- A working IPsec VPN tunnel between your on-premises infrastructure and OVHcloud.
- Access to the Zerto console and vCenter interfaces on both sides.

>[!warning]
> As of May 2025, **Zerto does not support replication of virtual machines with VMEncrypt enabled**.
> vSAN’s encryption at rest is supported. You can also encrypt your VMs after migration is complete.

## Instructions

![Move2CloudZerto](/pages/assets/screens/other/zerto/move2cloud-zerto.png){.thumbnail}

### Step 1: Define your migration scope

At the end of this step, you will have a structured list of workloads to migrate and the associated network design.

#### Step 1.1: Create an inventory of source VMs

List all virtual machines to be migrated and collect the following data:

- FQDN and static IP address
- Operating system and version
- Application or service associated with each VM
- Technical dependencies (for example, frontend servers depending on a database VM)

This inventory allows you to group VMs into consistent application stacks for batch migration.

#### Step 1.2: Group VMs into migration batches

Organize your VMs into logical groups according to application-level dependencies.
Each batch should contain all virtual machines required to migrate and operate a single application, such as:

- Web frontend VM
- Application logic VM
- Database backend VM

#### Step 1.3: Document the current network configuration

Record the full network configuration used by your source VMs:

- VLAN IDs and associated subnets
- IP address ranges to preserve
- Inter-VM communication flows (source/destination, port, protocol)

This network design will be recreated in your OVHcloud HPC tenant using `vRack` and NSX-T.

You can find more about network planning in [NSX-T - First steps](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/nsx-01-first-steps).

For additional guidance from Zerto, refer to [Installing the Zerto Solution](https://help.zerto.com/bundle/Install.HV.HTML/page/Installing_the_Zerto_Solution.htm){.external}.

### Step 2: Plan Hosted Private Cloud resources

This step helps you determine the required compute, storage, and network resources for your HPC environment.

#### Step 2.1: Estimate CPU and memory

Review your current infrastructure to calculate how many vCPUs and how much RAM you will need in the target environment.

Use your existing pCPU/vCPU consolidation ratio to size the number of `ESXi hosts` required.

#### Step 2.2: Define storage capacity

Based on your workloads, select the most appropriate storage type:

- `NFS datastores` for general-purpose workloads
- `vSAN` for performance-intensive applications

Estimate total disk space needed, plus redundancy if applicable.
If your workloads require high IOPS, vSAN is the preferred option.

#### Step 2.3: Plan the target network

Plan how your virtual network will be recreated using NSX-T:

- Decide which segments will be VLAN-backed vs. overlay.
- Identify gateway needs (Tier-0 and Tier-1).
- Evaluate firewalling rules and north/south traffic.

If you need to expose services on the internet, you can:

- Request public IPs via your `Hosted Private Cloud`.
- Migrate your existing IP ranges using the [Bring Your Own IP (BYOIP)](/links/network/byoip) feature.

### Step 3: Enable access to the vCenter

Access to vCenter is restricted by default in all OVHcloud HPC environments.

You must explicitly allow your admin IPs to reach the `vCenter` endpoint.

To do so:

1. Log in to the [OVHcloud Control Panel](/links/manager).
2. Select your `Hosted Private Cloud`{.action}.
3. Navigate to the `Security`{.action} tab.
4. Click `Add a new IP address range`{.action} to authorize your source infrastructure IPs and Zerto components.

For step-by-step instructions, refer to [Authorise IPs to connect to vCenter](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/autoriser_des_ip_a_se_connecter_au_vcenter).

### Step 4: Configure roles and permissions

This step ensures that administrators and tools like Zerto have the correct access to vSphere resources within your OVHcloud Hosted Private Cloud.

#### Step 4.1: Use OVHcloud IAM

Set up roles and permissions in your `Hosted Private Cloud` using `OVHcloud IAM`.

> [!warning]
> **OVHcloud IAM is not available in SecNumCloud (SNC), PCI-DSS, or HDS environments.**
> If you are using one of these qualified environments, you must configure roles and permissions directly in vSphere or use an external IAM solution such as Microsoft Active Directory or Okta.

For instructions, refer to the [IAM setup guide](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/vmware_iam_getting_started).

#### Step 4.2: Connect your own IAM solution

If you prefer to use your existing identity provider (e.g., Active Directory or Okta), deploy a directory service directly in your OVHcloud tenant.

You can also link OVHcloud IAM with your existing ADFS server to enable SAML-based SSO.

To do so, follow [Connect OVHcloud IAM to ADFS](/pages/account_and_service_management/account_information/ovhcloud-account-connect-saml-adfs).

#### Step 4.3: Service accounts for Zerto

Zerto components require specific vSphere roles and permissions to function. You can:

- Create a dedicated `zerto-admin` account in vSphere.
- Assign the necessary privileges to manage replication and recovery.

Details on required permissions are available in Zerto’s documentation:

[Roles and Permissions Within Zerto](https://help.zerto.com/bundle/Admin.VC.HTML.90/page/Roles_and_Permissions_Within_.htm){.external}

### Step 5: Build the target network

Before starting any VM replication or failover test, your Hosted Private Cloud network must be ready to receive the workloads. This includes replicating the source structure, creating the right segments, and preparing firewall rules.

#### Step 5.1: Recreate your VLANs and segments

When your HPC is delivered, it comes with a default distributed virtual switch and at least one VLAN. You can add your own VLANs via the `vRack`.

If you are using NSX-T, plan your segmentation as follows:

- Define your segments (VLAN-backed or overlay).
- Assign each to a corresponding application batch or service zone.
- Recreate IP addressing schemes as defined in your inventory.

Refer to [NSX-T – First steps](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/nsx-01-first-steps) for details on creating segments and assigning them to VMs.

#### Step 5.2: Configure NSX-T routing and gateways

If using NSX-T, you must define how traffic will route between segments and to the internet:

- A **Tier-1 Gateway** handles internal routing.
- A **Tier-0 Gateway** connects your environment to upstream services or external networks.

These gateways are automatically deployed when NSX-T is enabled. You can review and modify them in the `NSX Manager` interface.

Set up routing and services based on your flow matrix defined in Step 1.

#### Step 5.3: Prepare firewall rules

NSX-T provides a **distributed firewall (DFW)** that controls east-west traffic between VMs. You should define rules for:

- Application-specific ports (e.g., web → app, app → db)
- Management access to vCenter and Zerto components
- Optional: quarantine or isolation zones for test VMs

If you're not using NSX-T, implement similar rules using your preferred virtual appliance firewall (e.g., FortiVM, Stormshield, Palo Alto VM-Series).

You can find an overview of how NSX handles these features in [NSX-T – First steps](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/nsx-01-first-steps).

### Step 6: Deploy core services in the target HPC

Your migrated workloads will need basic infrastructure services to function properly once they are running in your Hosted Private Cloud.

#### Step 6.1: Deploy NTP

Ensure all VMs and services use a consistent time source. You can configure your HPC workloads to use `ntp.ovh.net` as a reliable time server.

#### Step 6.2: Deploy DNS

If your applications rely on internal DNS resolution, deploy a domain controller or dedicated DNS server inside your HPC environment. This can be a clone of your on-prem server or a new instance.

#### Step 6.3: Set up authentication services

If your authentication is based on Active Directory, deploy a replica domain controller in the HPC.

You can also establish secure communication between the on-prem AD and the tenant to avoid duplicating identities.

### Step 7: Install and activate Zerto in the OVHcloud tenant

Zerto is installed and managed per site. On the OVHcloud side, the components are deployed automatically when you activate Zerto.

In your `Hosted Private Cloud`{.action} interface:

1. Go to `Disaster Recovery`{.action}.
2. Select `Enable Zerto Virtual Replication`{.action}.
3. Confirm and wait for deployment.

OVHcloud will deploy the following:

- A dedicated ZVM (Zerto Virtual Manager).
- A ZVRA (Zerto Virtual Replication Appliance) on each ESXi host.
- An OVH-managed NSX-T firewall with preconfigured rules for Zerto ports.

Full details can be found in [Zerto Virtual Replication on OVHcloud](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/zerto-virtual-replication-customer-to-ovhcloud).

### Step 8: Install Zerto on the source site

You must install Zerto components manually on your on-premises infrastructure.

Follow the procedure in [Installing Zerto on source site](https://help.zerto.com/bundle/Install.VC.HTML/page/Performing_an_Express_Installation.htm){.external}.

The main components are:

- ZVM: Installed on a Windows Server with vSphere access
- ZVRAs: Deployed on each ESXi host hosting protected VMs

Ensure that:

- TCP ports 9071, 9081 are open between ZVMs.
- TCP ports 4007, 4008 are open between ZVRAs.

### Step 9: Set up the IPsec VPN tunnel

Zerto requires **direct communication** between ZVMs and ZVRAs. NAT is not supported.

Set up a site-to-site IPsec tunnel between your on-prem firewall and the OVHcloud tenant.

You can use any compatible device (e.g., Fortinet, Palo Alto, OPNsense).

Details and parameters are available in [Zerto VPN Setup on OVHcloud](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/vmware_zerto_virtual_replication_customer_to_ovh).

### Step 10: Pair the sites and create VPGs

Once ZVMs are online and communication is confirmed:

1. Use the Zerto console to **pair both sites**.
2. Create your first **Virtual Protection Group (VPG)**.

A VPG groups all VMs that should be replicated and failed over together.

More information in [Creating a VPG](https://help.zerto.com/bundle/Admin.ZSSP.HTML.10.0_U3/page/Creating_a_VPG.htm){.external}

### Step 11: Monitor the replication status

Monitor each VPG from the Zerto UI:

- Confirm that replication is active.
- Check the RPO (Recovery Point Objective).
- Resolve any alerts before running a test or failover.

Refer to [Monitoring Virtual Protection Groups](https://help.zerto.com/bundle/Admin.ZSSP.HTML.10.0_U3/page/Monitoring_Virtual_Protection_Groups.htm){.external}

### Step 12: Run a test failover

Before migrating production workloads, test the behavior of your VMs in the OVHcloud tenant.

Use the `Failover Test` option in the Zerto UI. This powers on the replicated VMs without impacting production.

Instructions:

- [Starting and Stopping Failover Tests](https://help.zerto.com/bundle/Admin.VC.HTML.10.0_U3/page/StartingFailoverTest.htm){.external}
- [What Happens After Starting a Test?](https://help.zerto.com/bundle/Admin.VC.HTML.10.0_U3/page/What_Happens_After_Starting_a_Test.htm){.external}

### Step 13: Execute the planned migration

When you are ready to migrate:

1. Use the **Move** operation in Zerto to migrate each VPG.
2. Choose the commit policy (manual, auto, rollback).

See [The Move Process](https://help.zerto.com/bundle/Admin.ZSSP.HTML.10.0_U3/page/The_Move_Process.htm){.external} for full instructions.

### Step 14: Validate application availability

After the move:

- Verify that all VMs are powered on.
- Test connectivity (AD, DNS, Bastion, internet).
- Validate each application and service.

### Step 15: Commit or roll back the migration

If all tests succeed, commit the operation in Zerto.

If something is not working, you can cancel the move and roll back to your on-prem environment.

More in [Moving Protected VMs to Remote Site](https://help.zerto.com/bundle/Admin.ZSSP.HTML.10.0_U3/page/Moving_Protected_Virtual_Machines_to_the_Remote_Site.htm){.external}

### Step 16: Use Storage vMotion to place VMs on target storage

After migration, you may want to move some VMs to another datastore or vSAN policy.

Use `Storage vMotion`{.action} via the `vSphere Client`{.action}:

1. Right-click on the VM > `Migrate`{.action}.
2. Select `Change storage only`{.action}.
3. Choose the destination datastore or vSAN policy.

See [VMware Storage vMotion](/pages/hosted_private_cloud/hosted_private_cloud_powered_by_vmware/vmware_storage_vmotion) for full details.

### Step 17: Back up your workloads

Once your VMs are in production, secure them with a backup plan.

You have 2 options:

- **Option 1**: Use **Veeam Backup as a Service** if you want a managed backup solution integrated with your HPC.
- **Option 2**: Deploy your own Veeam Backup server and use **Veeam Backup & Replication for Public Cloud**.

## Go further

If you need training or technical assistance to implement our solutions, contact your sales representative or click on [this link](/links/professional-services) to get a quote and ask our Professional Services experts for a custom analysis of your project.

Ask questions, give your feedback and interact directly with the team building our Hosted Private Cloud services on the dedicated [Discord](https://discord.gg/ovhcloud) channel.

Join our [community of users](/links/community).
Loading