Presentation: 75 minutes Lab: 60 minutes After completing this module, students will be able to: Describe Microsoft® Virtualization Describe virtualization management. Evaluate the current environment for virtualization. Plan the Hyper-V™ server role. Required materials To teach this module, you need the Microsoft Office PowerPoint® file 10215A_01.ppt. Important: It is recommended that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be displayed correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Detailed steps for the demonstrations are provided in the course companion CD. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Make sure that students are aware that there are additional information and resources for the module on the Course Companion CD.
As you introduce this module and lesson, ask students why their organizations are exploring the use of virtualization. Ask them what the most urgent requirements are that are driving the implementation of virtualization. Also ask them to describe what types of virtualization are being implemented or considered. Almost all organizations are looking at some type of virtualization, so use this topic to gain more understanding of the benefits that your students are expecting to get from virtualization. Question: Why are your organizations exploring the use of virtualization? Answer: Answers will vary. In most cases, organizations are considering at least server virtualization as a means to address the very low server utilization in most data centers.
The concept and options for virtualization has developed rapidly in the last few years. Spend some time with this topic, and define virtualization. Stress that it essentially just separates the traditional connection between operating systems, applications, and data from a single hardware instance. Then provide a high-level overview of the different options for enabling virtualization. This module covers each of these virtualization options in more detail, so do not spend a lot of time on each option now. Mention that central role that Microsoft System Center tools provide in managing the virtual environment. Deploying virtualization may appear to increase the complexity of the information technology (IT) infrastructure, so stress that the System Center tools provides a variety of tools to manage both the physical and the virtual environments.
Most students in the class will be familiar with server virtualization, and later modules go into more detail on the server virtualization architecture, so do not spend too much time on this topic. Concentrate on the benefits of virtualization. If you have students who are new to server virtualization, consider discussing the lab environment for this course as an example of server virtualization. Briefly discuss the concept of host computers and virtual machines, or guest operating systems.
Most students will be familiar with Microsoft Virtual PC. It has been available for several years. Highlight that this tool, along with the enhanced version available in Windows® 7, is still an important part of a desktop virtualization strategy. Highlight that Virtual Desktop Infrastructure (VDI) and Microsoft Enterprise Desktop Virtualization (MED-V) provide other options for providing the client computer environment. You can use both of these tools to manage the virtual client computers, but they take different approaches. VDI actually uses a server virtualization environment to provide desktops to users. MED-V provides the tools to centrally manage and deploy virtual desktops that users will download to their local computers before running. Question: When would you use each of the desktop virtualization options? Answer: Client-based desktop virtualization is very simple to deploy, and it does not require any server infrastructure. This makes it a logical option for small organizations or organizations that do not have a requirement for a more-complex and robust desktop virtualization environment. VDI is the best solution for organizations that have external users or users in branch offices connecting across slow wide area network (WAN) links to run business applications. MED-V provides powerful tools for organizations that require virtual client computers for many users.
Students may be familiar with Terminal Services or the administrator access to remote desktop from previous versions of Windows Server. If they are, use this understanding to explain how users can access applications running on centralized servers. Highlight that the name for the presentation feature has changed in Windows Server® 2008 Release 2 (R2), but that most of the features have not changed significantly.
Tell students that if you manage your virtual environment with System Center Virtual Machine Manager 2008 R2, it is necessary to plan backup for its resources and settings. Discuss possible ways to back up each listed component on the slide. Explain that Virtual Machine Manager (VMM) does not have a built-in utility for backing up all the resources but that it can backup the VMM database. Remind students that the VMM database is a Microsoft SQL Server® database that contains all VMM configuration information, so it is very important to back up. Spend some time discussing database restore considerations, because they are very important points. Question: Which technique can you use to backup Library Server resources, such as International Organization for Standardization (ISO) files, virtual hard disks (VHDs), virtual machine templates, and other resources? Answer: Since Library files are stored in a file share on the Library server, you can use any available method for file and folder backup. However, be sure that you back up a database, because of Library metadata.
Question: How will virtualization help Contoso, Ltd. address the issues in its current computing environment? Answers : Server virtualization will help Contoso address the server utilization issues. By running multiple virtual machines on a single physical server, the organization will be able to increase server utilization significantly. The organization may consider several options for addressing the branch office server issue. It might consider using server virtualization to simplify and standardize the deployment in each branch office. Contoso also might consider using presentation virtualization to run some of the applications that the branch offices require. There are several options from which the organization could choose to address the need for remote users to run a standard set of business applications. If the users are connecting from computers that are never connected to the internal network, the best option is probably to use presentation virtualization or VDI to provide the applications. If users must run the applications while offline, or if the client computers are occasionally connected to the internal network, the organization could consider using client desktop virtualization including using MED-V to distribute the client virtual machine. The organization also might be able to deliver the applications as virtual applications using Microsoft Application Virtualization (App-V). The organization also could consider running custom applications by using client-based desktop virtualization or application virtualization. By using desktop virtualization, the organization could deploy virtual machines with the applications preconfigured. With application virtualization, users could run potentially incompatible applications on their desktop computers.
This topic is designed to get students thinking about what is different about managing an IT infrastructure that has many virtual components compared to the traditional environment, where there typically is a much more direct correlation between applications, operating systems, and physical hardware. Before discussing the points on the slide, ask students what makes managing a virtualized environment different. Point out that the virtualized environment actually may be more complex to manage than the traditional environment because virtualization provides so many more options. Stress the importance of including virtualization management as part of an organization’s virtualization strategy.
Use this topic to provide an overview of how to use System Center products to manage a virtual environment. The following topics provide more detail on the functionality that each tool provides. Stress that in many cases, the System Center products manage both the virtual and physical components in the infrastructure without any distinction. For example, you can monitor the performance of both physical and virtual computers using Operations Manager 2007. The actual counters that you monitor on the servers may be different, but the process for monitoring the servers is exactly the same.
Spend some time reviewing some of the features that are available in VMM. This product is covered in detail later in this course, but it is useful to review the features now. Highlight that VMM is designed to be used to manage most server virtualization environments, including Virtual Server 2005 R2 and VMware. That means that organizations can consider deploying VMM even if they do not yet have Hyper-V deployed.
Point out that Data Protection Manager (DPM), like the other System Center products, does not make a clear distinction between backing up virtual machines and backing up physical machines. You can install the DPM agent on other types of machines, and then backup and restore the servers using the same administrative console. Be prepared to spend some time discussing the differences between VSS-aware machines and those that are not. VSS-aware virtual machines enable the snapshot process inside the virtual machine while it is running. This enables the backup to occur without disruption. With virtual machines that are not VSS-aware, the snapshot has to occur outside of the virtual machine, so you must hibernate it briefly before taking the snapshot.
Point out that Operations Manager 2007 R2 has been tightly integrated with server virtualization in many ways. If students are not familiar with how Operations Manager 2007 works, you might want to provide a brief overview. Stress the importance of management packs, and that they provide the rules that enable the intelligent management of many different services and applications. You also might refer to the Performance and Resource Optimization (PRO) feature in VMM, which uses the Operations Manager 2007 integration to help manage virtual machines and hosts intelligently. The topic on VMM covered this feature.
Point out that Configuration Manager 2007 R2 enables management of both physical and virtual machines by using consistent processes and tools. Spend some time on the features in Configuration Manager that are specifically designed for the virtualized environment. For example, consider drawing a diagram that shows how you can use Configuration Manager to distribute the virtual applications that you create in App-V. App-V provides its own application streaming mechanism, but you can replace this with Configuration Manager.
Discuss the factors that need to be considered when choosing which physical server workloads to virtualize. In most cases, the hardware requirements will be the most important factor, as very few workloads are not supported or are not compatible with virtualization. Emphasize the goal of making sure that all servers are appropriately utilized. This means the virtualization is the best option in many cases, but that there also are scenarios in which you can use other options to increase the workload on servers to the point where they are using all of their dedicated hardware resources. Question: What server workloads will you virtualize in your organizations? How will you make the decisions about what to virtualize? Answer: Most organizations begin by virtualizing test and development servers, because these servers typically do not have the same availability and performance requirements of production servers. The first servers that are virtualized in production typically are those that are used lightly, such as Web servers. In many organizations, virtualization has become the default configuration. This means that all servers are virtualized unless there is a good reason not to virtualize a specific server.
Consider downloading one of the solution accelerators to show students what the tools look like. Students will probably be most interested in the Windows Server Virtualization guide, which is one of the Infrastructure Planning and Design Guides. Show students the step-by-step approach that the guide describes, as well as the appendix, which includes many templates that students can use during a virtualization project.
The next demonstration will provide examples of the types of information that the Microsoft Assessment Planning (MAP) Toolkit collects, so just provide a summary of the features in this topic. Stress that the MAP data collection process does not require that an agent be installed on the scanned computer, but that it will require administrator access to the computers, and the client firewalls will need to be configured to enable the remote collection of information. The client firewalls must be configured to enable Remote Administration (TPC port 135), and File and Printer Sharing (TCP ports 139 and 445, and UDP ports 137 and 138).
Demonstration Steps: Use MAP to create an inventory of servers in your IT environment . 1.On VAN –CL1, click Start , click All Programs , click Microsoft Assessment and Planning Toolkit , and then click Microsoft Assessment and Planning Toolkit . 2.Under Create an inventory database, type Contoso in the Name field. 3.Click OK . 4.In the main window, click Inventory and Assessment Wizard . 5.On the Computer Discovery Methods page, note the options for locating servers in the environment. Clear all check boxes, and the select the Manually enter computer names and credentials check box. Click Next . 6.On the Enter WMI credentials page, click on New Account . 7.In the Inventory Account window, in the Domain Name field, enter Contoso . 8.In the Account Name field, enter Administrator . 9.In the Password and the Confirm Password fields, enter Pa$$w0rd . 10.In the Computer name field, type LON-SVR3 . 11.Click Save . 12.Click Next on the Enter WMI credentials page. 13.Click Finish on the Review Settings page. 14.On the Status page, wait until the scan is complete, and then click Close . Review the information that MAP provides. 15.In the left pane, expand Server Consolidation , and then click Performance Metrics Results . 16.Click Performance Metrics Wizard . 17.On the Import Computer Names page, click Browse , and locate the ServerNames.txt file in d:\\Labfiles. 18.Click Next . 19.Click OK to acknowledge the confirmation message that follows. 20.On the Enter WMI credentials page, click New Account . 21.In the Inventory Account window, in the Domain Name field, enter Contoso . 22.In the Account Name field, enter Administrator . 23.In the Password and Confirm Passwords field, enter Pa$$w0rd . 24.Click Save . 25.Click Next on the Enter WMI credentials page.
26.On the Performance Collection Duration page, set the end date and time for the collection to end, such as to 7 days from the today. 27.Click Next . 28.Click Cancel to stop the performance metrics collection, and then click Yes . Run the Server Consolidation Wizard, and review the proposal and reports that the wizard generates. 1. Click File , and then click Select a Database . 2. Click Use an Existing Database , select MapHolDb-03 from the drop-down list box, and then click OK . 3. In the top-left tree view, click Server Consolidation . 4. In the center pane, under Configure Host and Run Analysis Engine , click Server Consolidation Wizard . 5. Verify that Windows Server 2008 R2 Hyper-V is selected, and then click Next . 6. Ensure that Use the current hardware configuration is selected, and then click Next . 7.From the Manufacturer drop-down list box, select Intel , and then click Next . 8. On the Storage page, click Next . 9. On the Network and Memory page, click Next . 10. On the Host and Guest Thresholds page, select the Select this option check box, type the number 5 in Number of virtual machines per host , and then click Next . 11. Click Browse to select a file, and open the d:\\Labfiles\\network-computers1.txt file. 12. Click Next , and click OK , and then a summary of the host machine configuration is shown. 13. Click Finish to start the placement assessment. 14. When the assessment is complete, click Close . 15. Expand Server Consolidation in the top-left tree view, and click Server Consolidation Results node. You can review the server consolidation assessment results within the user interface (UI). Question: How can the information that the MAP Toolkit collects be useful? Answer: the MAP Toolkit can collect several different types of data, including information on which client computers you can upgrade to Windows 7, which servers you can upgrade to Windows Server® 2008 or Windows Server 2008 R2, and which servers are good virtualization candidates.
Be prepared to spend some additional time on this topic. This is the only topic that addresses a virtualization project from a step-by-step perspective, so ensure that students are comfortable with the overall process and decision points that need to be made as part of a virtualization project.
The slide diagram provides an overview of the Hyper-V architecture. Use the diagram to discuss the concepts of parent and child partitions, and how the partitions interact with the physical hardware. Use the different examples of operating systems that run in child partitions to describe the different types of available hardware emulation.
Consider opening Hyper-V Manager and briefly describing the configuration components in a Hyper-V virtual machine. The next two modules cover these configuration options in more detail, but if students have not seen these options before, a short demonstration will help them to visualize them. As you discuss the different operating system options for virtual machines, emphasize that the configuration options in Hyper-V change depending on the guest operating system. Also considering showing how the amount of random access memory (RAM) or the number of processors that you can assign to a virtual machine are dependant on the host computer’s physical hardware.
Mention that Hyper-V in Windows Server 2008 R2 is built on the previous release. The following are the Hyper-V improvements in Windows Server 2008 R2: Live Migration Dynamic virtual machine storage Improved VHD performance Enhanced processor support Enhanced networking support Cluster shared volumes Discuss the improvements in detail. Mention that the dynamic virtual storage functionality supports reconfiguring virtual machines by adding and removing hard disks and physical disks while it is running. Mention that the enhanced networking support feature enables virtual machines to use jumbo frames up to 9,014 bytes in size, if the underlying physical network supports it. Mention that many of the new Hyper-V features, such as virtual machine queue (VMQ), Chimney, and CPU core parking, require compatible hardware. Question: Will your company benefit from the new Hyper-V features in Windows Server 2008 R2? Which new feature is most useful to you? Answer: Answers will vary, based on the students’ environments, but all who use Hyper-V virtualization will benefit from the new features. Live Migration is most often mentioned, but improved VHD performance and enhanced networking support also are very beneficial. If students' environments include more than 16 CPU servers, they also will benefit from enhanced processor support.
This topic provides maximum hardware configurations for Hyper-V hosts and virtual machines. Mention that these limits are for Windows Server 2008 R2 hosts, and that the limits were lower in Windows Server 2008. Emphasize that these tables list the maximum hardware levels. When planning the Hyper-V deployment, you have to evaluate each server workload that you are virtualizing to identify its optimal hardware configuration.
Highlight that, for the most part, Hyper-V can use any storage option for storing virtual machine files. The only exception is that network attached storage (NAS) is not supported. Briefly summarize some of the ways in which virtual machines use storage. For now, mention that this information needs to be considered when planning the virtualization infrastructure. Later modules will provide much more detail on the planning implications for storage.
Like the other topics in this lesson, this topic is designed to provide students with some understanding of the options available. Avoid going into too much detail on these technologies at this point, because Module 9 covers them in more detail.
This topic provides an overview of the available options that you can use to enhance security of a Hyper-V deployment. This content is not explicitly covered elsewhere in the course, so spend some additional time on this topic.
Exercise 1: Planning for the Hyper-V Server Role In this exercise, you will: Determine the most appropriate Hyper-V implementation based on organizational requirements and scenarios. Estimated time to complete the exercise: 15 minutes Exercise 2: Assessing the Computing Environment by Using the MAP Toolkit In this exercise, you will: Configure the Microsoft Assessment and Planning Solution Accelerator: Create an inventory database. Run the report wizard to create appropriate reports related to virtualization. Analyze the inventory and assessment reports: Analyze the generated reports and answer questions related to the results. Note: The lab exercise answer keys are provided on the Course Companion CD. To access the answer key, click the link located at the bottom of the relevant lab exercise page.
Use the questions on the slide to guide the debriefing after students complete the lab exercises. 1. Why did you need to use a previously prepared database for creating the reports in this lab? Answer : You needed to use the prepared database because MAP uses performance data as part of its analysis for which servers to virtualize. Normally, you would let MAP collect this information for several days to ensure it had accurate data. 2. Which servers will you virtualize first in your organization? Answer : Answers will vary. In most organizations, the first servers that will be virtualized are test or development computers. Other common options are servers running on old hardware or those that are underutilized.
Review Questions 1.Your organization is considering implementing server virtualization using Hyper-V. What is the primary thing that you need to consider when purchasing servers for this role? Answer : You will need to purchase servers with 64 bit hardware that support virtualization. The servers must also support Hardware Data Execution Prevention (DEP) and hardware-assisted virtualization, and these options must be enabled in the basic input/output system (BIOS). 2.Your organization is planning to implement server virtualization using Hyper-V and presentation virtualization using Remote Desktop Services. Your manager is concerned that you will not be able monitor the servers effectively. What tool should you be including in your plans? Answer : You should install System Center Operations Manager 2008 R2. You can use it to monitor a large number of servers. 3.Your organization is considering implementing server virtualization. You would like to identify servers in your organization that can be virtualized. How can you identify these servers? Answer : You could use the MAP Toolkit to identify these servers. If you have Operations Manager 2007 installed, you also can use it to collect information on which servers you can virtualize. Real-World Issues and Scenarios 1.Your organization is testing a custom application. The testers report that when they install the application on computers running an older version of the same application, they get errors. How could you address this issue? Answer : The best solution in this scenario is to implementation application virtualization using App-V. With App-V, you could deploy the new application in a virtual environment and avoid compatibility issues. 2.Your organization has several hundred part-time employees who work outside the office. The employees all need to run an application that needs to access a database server located in the main office’s data center. How can you make this application available to users? Answer : The best solution will be to publish the application on a Remote Desktop Services Session Host at the main office. By using Remote Desktop Services Gateway, you can provide secure access to the application for users outside the organization. 2.You are an IT architect at a large insurance provider. You have migrated many important applications to virtual machines and want to increase the availability of those virtual machines. How can availability of applications be increased when you use Hyper-V? Answer : Depending on the type of application, you might be able to use either Network Load Balancing or Failover Clustering to make the applications highly available.
10215 A 01
Module 1 Evaluating and Planning for Virtualization
Module Overview <ul><li>Overview of Microsoft Virtualization </li></ul><ul><li>Overview of Virtualization Management </li></ul><ul><li>Evaluating the Current Environment for Virtualization </li></ul><ul><li>Planning the Hyper-V Server Role </li></ul>
Lesson 1 : Overview of Microsoft Virtualization <ul><li>Challenges of Traditional Network Environments </li></ul><ul><li>Virtualization Modes </li></ul><ul><li>What Is Server Virtualization? </li></ul><ul><li>What Is Desktop Virtualization? </li></ul><ul><li>What Is Presentation Virtualization? </li></ul><ul><li>What Is Application Virtualization? </li></ul><ul><li>Discussion: Implementing Microsoft Virtual Solutions </li></ul>
Challenges of Traditional Network Environments Challenges are: <ul><li>Data centers are at capacity </li></ul><ul><li>Servers are under utilized </li></ul><ul><li>Servers are difficult to manage and secure </li></ul><ul><li>Legacy hardware and systems </li></ul><ul><li>Application compatibility issues </li></ul>
What Is Server Virtualization? Server virtualization enables multiple virtual machines to run on one physical host Benefits: <ul><li>Server consolidation </li></ul><ul><li>Service or application isolation </li></ul><ul><li>Simplified server deployment and management </li></ul><ul><li>Increased service and application availability </li></ul><ul><li>Multiple operating systems can run on one consistent platform </li></ul>
What Is Desktop Virtualization? Desktop virtualization provides options for virtualizing client operating systems Desktop virtualization option Description Client-Hosted Virtual machines run on the user desktop to provide an alternate computing environment Virtual Desktop Infrastructure Client virtual machines are hosted in the data center and accessed through remote desktop Microsoft Enterprise Desktop Virtualization Provides the tools to build and deploy client virtual machines to user desktops
What Is Presentation Virtualization? <ul><li>Presentation virtualization runs applications on centralized servers </li></ul><ul><li>Windows Server 2008 R2 Remote Desktop Services replaces Terminal Services </li></ul>Benefits include: <ul><li>Centralized data </li></ul><ul><li>Simplified application management </li></ul><ul><li>Fewer application compatibility issues </li></ul><ul><li>Improved performance </li></ul>
What Is Application Virtualization? Application virtualization provides virtual environments for applications running on user desktops Benefits include: <ul><li>Enables potentially incompatible applications to run on one computer </li></ul><ul><li>Application deployment is easier </li></ul><ul><li>Virtual application use is transparent to users </li></ul><ul><li>Virtual applications are easy to deploy </li></ul>
Discussion: Implementing Microsoft Virtual Solutions Implementing Microsoft Virtual Solutions
Lesson 2: Overview of Virtualization Management <ul><li>Managing a Virtual Environment </li></ul><ul><li>Overview of Microsoft System Center </li></ul><ul><li>Using Virtual Machine Manager to Manage Virtual Environments </li></ul><ul><li>Protecting Virtualized Environments with Data Protection Manager </li></ul><ul><li>Monitoring Virtual Environments by Using Operations Manager </li></ul><ul><li>Maintaining a Virtual Environment by Using Configuration Manager 2007 </li></ul>
Managing a Virtual Environment Managing a virtual environment is different than managing a physical environments: <ul><li>Virtualized environment are dynamic </li></ul><ul><li>Virtualized environments may be centralized on heavily utilized physical servers </li></ul><ul><li>Virtual and physical computers may need to be managed with different tools </li></ul><ul><li>Virtual environments may have increased management complexity </li></ul><ul><li>Virtual environments may require additional monitoring </li></ul>
Overview of Microsoft System Center Product Description System Center Operations Manager 2007 R2 Enables monitoring and managing the hardware and software in a distributed environment System Center Configuration Manager 2007 R2 Enables automated installation and configuration of software and operating system updates System Center Virtual Machine Manager 2008 R2 Enables the centralized management of virtual machines and the host computers System Center Data Protection Manager 2007 Enables backup and restore of virtual and physical servers
Using Virtual Machine Manager to Manage Virtual Environments Virtual Machine Manager (VMM) is used to: <ul><li>Manage virtual machines running on different host platforms </li></ul><ul><li>Convert physical and virtual machines to Hyper-V virtual machines </li></ul><ul><li>Intelligently manage virtual machine placement </li></ul><ul><li>Enable self-service management of virtual machines </li></ul><ul><li>Enable storage of virtual machine components in a library </li></ul><ul><li>Integrate with Operations Manager 2007 to manage virtual machines and hosts </li></ul>
Protecting Virtualized Environments with Data Protection Manager Data Protection Manager enables: <ul><li>Backup and restore virtual and physical computers </li></ul><ul><li>Host backups that backup individual or all virtual machines </li></ul><ul><li>Virtual machine backups for either VSS-aware or non-VSS aware virtual machines </li></ul>Data Protection Manager enables: <ul><li>Backup and restore of virtual and physical computers </li></ul><ul><li>Host backups that backup individual or all virtual machines </li></ul><ul><li>Virtual machine backups for VSS-aware or those that are non-VSS aware virtual machines </li></ul>
Monitoring Virtual Environments by Using Operations Manager Data Protection Manager enables: <ul><li>Backup and restore virtual and physical computers </li></ul><ul><li>Host backups that backup individual or all virtual machines </li></ul><ul><li>Virtual machine backups for either VSS-aware or non-VSS aware virtual machines </li></ul>Operations Manager 2007 R2 enables: <ul><li>Centralized monitoring of systems </li></ul><ul><li>Management packs for monitoring host computers </li></ul><ul><li>Reports for planning and monitoring the virtual environment </li></ul><ul><li>Monitoring of applications and services in virtual machines </li></ul>
Maintaining a Virtual Environment by Using Configuration Manager 2007 Configuration Manager 2007 R2 enables: <ul><li>Automatic deployment of the Configuration Manager client to virtual and physical machines </li></ul><ul><li>Inventory of virtual machines </li></ul><ul><li>Deploying applications and software updates to virtual and physical machines </li></ul><ul><li>Deploying App-V virtual applications to desktop clients </li></ul><ul><li>Updating virtual machines while they are offline or in a VMM library </li></ul>
Lesson 3: Evaluating the Current Environment for Virtualization <ul><li>Evaluation Factors </li></ul><ul><li>Overview of Virtualization Solution Accelerators </li></ul><ul><li>Assessment Features of the MAP Toolkit </li></ul><ul><li>Demonstration: Assessing the Computing Environment by Using the MAP Toolkit </li></ul><ul><li>Designing a Solution for Server Virtualization </li></ul>
Evaluation Factors When identifying server workloads to virtualize, consider: <ul><li>Hardware requirements </li></ul><ul><li>Compatibility </li></ul><ul><li>Supportability </li></ul><ul><li>Licensing </li></ul>
Overview of Virtualization Solution Accelerators Microsoft Virtualization Solution Accelerators provide guidance and tools that help you design and implement virtualization <ul><li>Microsoft Assessment and Planning Toolkit </li></ul><ul><li>Infrastructure Planning and Design Guides </li></ul><ul><li>Offline Virtual Machine Servicing tool </li></ul><ul><li>Security Compliance Management Toolkit Series </li></ul><ul><li>Microsoft Deployment Toolkit </li></ul>
Assessment Features of the MAP Toolkit The MAP toolkit provides: <ul><li>Hardware inventory </li></ul><ul><ul><li>Agentless collection of data </li></ul></ul><ul><ul><li>Collects information about the hardware, drivers, and applications installed on target computers </li></ul></ul><ul><li>Data Analysis </li></ul><ul><ul><li>Identifies candidates for upgrading to new operating systems or for virtualization </li></ul></ul><ul><li>Readiness Reporting </li></ul><ul><ul><li>Detailed reports on findings </li></ul></ul>
Demonstration: Assessing the Computing Environment by Using the MAP Toolkit <ul><li>In this demonstration, you will see: </li></ul><ul><ul><li>How to collect information using the MAP Toolkit </li></ul></ul><ul><ul><li>The reports that the MAP Toolkit creates </li></ul></ul>
Notes Page Over-flow Slide. Do Not Print Slide. See Notes pane.
Designing a Solution for Server Virtualization <ul><li>Determine the virtualization scope </li></ul><ul><li>Create a list of potential workloads that you want to virtualize </li></ul><ul><li>Determine backup and fault-tolerance requirements for each workload </li></ul><ul><li>Design and place hardware for a virtualization host </li></ul><ul><li>Map workloads to hosts </li></ul><ul><li>Design host backup and fault tolerance </li></ul><ul><li>Determine storage requirements </li></ul><ul><li>Determine network requirements </li></ul>
Lesson 4: Planning the Hyper-V Server Role <ul><li>What Is Hyper-V? </li></ul><ul><li>Virtual Machine Overview </li></ul><ul><li>Features of Hyper-V in Windows Server 2008 R2 </li></ul><ul><li>Requirements and Limits for Virtual Machines and Hyper-V </li></ul><ul><li>Planning for Disks and Storage </li></ul><ul><li>Determining Availability Requirements for Virtual Machines </li></ul><ul><li>Securing the Hyper-V Server Role </li></ul>
What Is Hyper-V? Applications Applications Applications Windows Server 2003, 2008 Windows Kernel VMBus “ Designed for Windows” Server Hardware Windows hypervisor Supported Linux Distributions Linux VSC Child Partitions OS ISV/IHV/OEM Microsoft Hyper-V User Mode Kernel Mode Ring -1 Windows Server 2008 VMBus VMBus Parent Partition VM Services WMI Provider VM Worker Processes Applications Microsoft / Citrix Provided by VSP IHV Drivers Non-Hypervisor Aware OS Emulation VSC Windows Kernel
Virtual Machine Overview Virtual machine components include: <ul><li>Virtual processors </li></ul><ul><li>Memory </li></ul><ul><li>Network Adapters </li></ul><ul><li>Virtual Disks </li></ul>Virtual machines can run: <ul><li>Windows Server 2008 and Windows Server 2008 R2 </li></ul><ul><li>Windows Server 2003 SP2 and Windows Server 2003 R2 SP2 </li></ul><ul><li>Windows 2000 Server, SP4 </li></ul><ul><li>Redhat and Suse Linux </li></ul><ul><li>Windows 7, Windows Vista and Windows XP SP2 or later </li></ul>
Features of Hyper-V in Windows Server 2008 R2 Hyper-V in Windows Server 2008 R2 Cluster shared volumes Live Migration Dynamic virtual machine storage Improved VHD performance Enhanced processor support Enhanced processor support Enhanced networking support
Requirements and Limits for Virtual Machines and Hyper-V Host computer components Virtual machine components Component Description Logical processors 64 Virtual processors per logical processor 8 Virtual machines per server 384 running virtual machines Memory 1 TB Storage No limits imposed by Hyper-V Physical network adapters No limits imposed by Hyper-V Component Description Virtual processors 4 Memory 64 GB Virtual IDE disks 4 Virtual SCSI disks 256 Virtual hard disk capacity 2040 GB Snapshots 50 Virtual network adapters 12
Planning for Disks and Storage Hyper-V host computers can use: <ul><li>Directly attached storage </li></ul><ul><li>Storage Area Networks </li></ul>Virtual machines require storage for: <ul><li>Virtual hard disk files </li></ul><ul><li>Snapshots </li></ul><ul><li>Failover clustering </li></ul><ul><li>Application data files </li></ul>
Determining Availability Requirements for Virtual Machines To provide high availability, you can use: <ul><li>Virtual machine network load balancing for Web-based applications </li></ul><ul><li>Application clustering for applications that are failover clustering aware </li></ul><ul><li>Host-based failover clustering to make virtual machines highly available </li></ul>
Securing the Hyper-V Server Role <ul><li>Apply standard security policies to both host computers and virtual machines </li></ul><ul><li>Use a Server Core installation of Windows Server 2008 to manage the operating system </li></ul><ul><li>Use the security level of your virtual machines to determine the security level of your management operating system </li></ul><ul><li>Do not give virtual machine administrators permissions on the management operating system </li></ul><ul><li>Configure the network settings to enhance security </li></ul><ul><li>Use BitLocker Drive Encryption to protect resources </li></ul>Consider the following:
Lab : Evaluating the Network Environment for Virtualization <ul><li>Exercise 1: Planning for the Hyper-V Server Role </li></ul><ul><li>Exercise 2: Assessing the Computing Environment by Using the MAP Toolkit </li></ul>Logon information Estimated time: 50 minutes NYC-Host1, NYC-Host2 Host machines Virtual machines NYC-DC1, NYC-CL1 User name Administrator Password Pa$$w0rd
Lab Scenario <ul><li>Contoso, Ltd. is implementing server virtualization by using Hyper-V running on Windows Server 2008 R2. As a member of project team, you are responsible for creating the initial design and also for identifying the considerations for implementing this feature. </li></ul>
Lab Review <ul><li>Why did you need to use a previously prepared database for creating the reports in this lab? </li></ul><ul><li>Which servers will you virtualize first in your organization? </li></ul>
Module Review and Takeaways <ul><li>Review Questions </li></ul><ul><li>Common Issues and Troubleshooting Tips </li></ul><ul><li>Real-world Issues and Scenarios </li></ul><ul><li>Best Practices </li></ul><ul><li>Tools </li></ul>