SlideShare a Scribd company logo
1 of 12
Download to read offline
TECHNICAL BRIEF
The Easy Way to Ensure Uptime for Your
Critical Applications and Dependent Infrastructure
Written by
Ben Scheerer
Quest Server Virtualization Group
Quest Software Inc.
How to Virtualize
with Confidence
How to Virtualize With Confidence 2
Contents
Introduction ....................................................................................................................................................................3
How to Virtualize With Confidence.................................................................................................................................4
Challenges of Virtualizing Critical Infrastructure .........................................................................................................4
Visibility for Accurately and Quickly Resolving Performance Issues………………………………………………..…….5
From Detection to Diagnosis and Resolution……………………………………………………………………………..….9
Conclusion………………………………………………………………………………………………………………………...10
About the Author………………………………………………………………………………………………………………….11
How to Virtualize With Confidence 3
Introduction
Many organizations are successfully virtualizing and consolidating the “low-hanging fruit” such as file/print servers,
non-critical applications and the like. As virtualized workloads continue their upward trend, the next steps are almost
quantum leaps. The leaps are commonly made into both critical infrastructure (e.g., Microsoft Active Directory) and
tier 1 packaged applications (e.g., Microsoft Exchange).
What makes these leaps? Primarily it’s because so many organizations are ill-prepared or poorly equipped with the
tools and/or processes to manage availability and uptime deep into the layers of critical application infrastructure.
Problems worsen when organizations must deal with the complexity of mixed physical/virtual implementations in
which only partial components are virtualized, while others still reside on physical servers.
As you continue to virtualize more and more of this critical infrastructure, you want to be 100 percent sure you can
deliver the performance and uptime your stakeholders expect. The key to gaining confidence is proper monitoring
and management of your entire environment -- and that means reducing risk and increasing efficiency. In this
technical brief, we’ll discuss the challenges you’ll face in doing so. You’ll also learn what you need to overcome the
challenges, and how one powerful solution provides the most extensive set of capabilities on the market, yet is easy
to use. You will learn to worry less and less about keeping your users happy and maintaining availability.
How to Virtualize With Confidence 4
How to Virtualize With Confidence
Challenges of Virtualizing Critical Infrastructure
When organizations virtualize critical infrastructure components, such as Microsoft Active Directory (AD), they face
new and unique challenges. Typically, administration of AD proves more difficult than expected because of the
difficulties of identifying and understanding the demands of replication, performance and availability. These difficulties
are compounded when AD resides in a mixed physical/virtual environment. That’s because administrators must
pinpoint precisely where problems reside—are they in the underlying infrastructure (physical or virtual), or within
virtualization technology itself? The search for answers compels administrators to address the following:
 Understanding the AD component relationships between forests, domains, sites and other infrastructure in
mixed physical/virtual environments
 Detecting, diagnosing and resolving performance and availability issues affecting AD and underlying
infrastructure
 Communicating state- and service-quality information to stakeholders
The same difficulties surface when virtualizing into tier 1 applications (e.g., Microsoft Exchange). With Exchange,
administrators must manage across both physical and virtual boundaries, as well as accurately identify and
understand the causes of performance and availability issues. Exchange also poses unique difficulties in exposing
state and health information in relation to virtual environments.
Current management tools may fall short in supporting needs such as:
 Understanding the relationships and interactions between Exchange application components (roles, servers
and sites) plus supporting infrastructure
 Detecting, diagnosing and resolving performance and availability problems specific to the Exchange
application environment
 Communicating state- and service-quality information to stakeholders efficiently and thoroughly
How to Virtualize With Confidence 5
Visibility for Accurately and Quickly Resolving Performance
Issues
The inherent risk in virtualizing critical tier 1 applications and infrastructure lies in both ensuring and communicating
the vital state and heath information of the virtual and physical infrastructures. To do so, organizations must adopt a
solution that is not only virtual-aware, but also virtual-exploitive. This solution should deliver capabilities for
diagnosing, detecting and resolving issues in the virtual and physical infrastructures side-by-side
Furthermore, accurate diagnosis must allow a drill-down into the root cause of issues in the infrastructure. For
example, if the Exchange e-mail service is experiencing delays related to a memory problem, the best approach
would be: first, to identify the locations of the components where problems exist (in both virtual or physical
environments); then, if the problem is in the virtual infrastructure, administrators must be able to drill down to find it
quickly, as well as obtain details about the alerts and visual presentation of the situation (for example, high CPU-
ready values on the VMware ESX server). Finally, administrators must be able to access either guidance on how to
resolve the problem, or launch an in-context automated workflow to correct it. Figure 1 shows ideal visibility of the
virtualized Exchange Server (virtualized state indicated by the blue tag in lower left corner of server icon), as well as a
quick view of the health of the supporting four core resources and the common monitoring components:
 CPU
 Memory
 Network
 Storage
 Exchange Domain Controller Connectivity
Figure 1 also shows a dashboard that provides extensive visibility into resources highlighted by spinners,
send/receive and read/write motion indicators that change color on overall consumption or deviation from normal
values. This allows administrators to quickly detect, diagnose and resolve problems.
How to Virtualize With Confidence 6
Figure 1: vFoglight provides extensive visibility into the virtualized state and health of Exchange
Visibility must not only extend deeply into the AD and Exchange virtual and physical layers, but it must also be able to
reveal the information required for successfully managing the environment across the virtualized layer and within the
critical application infrastructure. For AD, visibility and analysis of key components—including forests, domains, sites
and domain controllers—must encompass both broad and granular data. With Exchange, key components to monitor
include roles, servers and sites. Figure 2 presents a “perspectives” view that includes data on critical components of
AD and Exchange in both VMware and Windows environments.
How to Virtualize With Confidence 7
Figure 2: This “perspectives” view provides insight of AD and Exchange components in both physical and virtual
environments.
With the data provided in Figure 2, administrators can get a quick assessment of the current state of the
environments. They can conduct further investigations into issues using color-coded symbols, which lead them to
problem areas. By clicking the “Explore” button, they can drill down to details. Figure 3 shows an example of a drill-
down into the data for two virtual servers hosting domain controllers in a caution state.
How to Virtualize With Confidence 8
Figure 3: Presentation of detailed data on health of AD and its associated components after administrators drill down
through the interface.
From Detection to Diagnosis and Resolution
Visual cues, along with essential alerts and reports, provide a clear understanding of the health of both virtual and
physical environments. These capabilities guide administrators to accurately diagnose problems and fix them quickly.
This level of management must provide:
 Visibility through logical and architectural representations of the AD and Exchange state and relationships,
including associations to the physical and virtual infrastructure
 Out-of-the-box alerts, with expert advice, to help administrators reduce mean time to resolution (MTTR) for
incidents and problems affecting AD and Exchange performance and availability
 Service-level performance and availability reports to show how AD and Exchange infrastructure is
supporting the business
An effective solution must help administrators accurately identify the root cause of issues and resolve them quickly.
Moreover, the solution must provide views that show data about the critical infrastructure and applications from the
operating system to the hypervisor (if applicable).
How to Virtualize With Confidence 9
Conclusion
Success in server virtualization depends on innovative performance-management technologies and practices.
Examining the virtualization layer in depth with a solution specifically designed for managing virtualized environments
from the ground up is essential.
When virtualizing AD and Exchange environments, the solution must be built to manage and monitor performance
across the multiple, diverse components in both physical and virtual environments. The ability to detect, diagnose and
resolve issues related to their interdependent components is also necessary.
Quest® vFoglight®, along with the Foglight® for Active Directory and Foglight® for Exchange cartridges provide the
capabilities for managing the entire infrastructure with greater efficiency and less risk. They allow administrators to
detect, diagnose and resolve problems affecting AD and Exchange -- as well as related components -- for both virtual
and physical environments. With vFoglight, administrators can visualize the AD and Exchange state and relationships
through logical and architectural representations. They can also use out-of-the-box alerts and built-in, expert advice
to maintain performance and availability. Service level agreement reports show how effective management of the
environment supports the business.
How to Virtualize With Confidence 10
About the Author
Ben manages product marketing for the Quest vFoglight virtualization monitoring solutions. His 18 years of industry
experience includes CA, Inc. and Vizioncore (which Quest acquired). Ben has served in a variety of roles, including
software sales and as consultant for product and solutions marketing. He speaks frequently at industry events and
has published a host of articles and white papers on IT management topics. Ben holds a master’s degree in
computer information systems from the University of Denver as well as a bachelor’s degree in marketing from
Western Michigan University. He is ITIL
®
V3 Foundation-certified.
How to Virtualize With Confidence 11
© 2010 Quest Software, Inc.
ALL RIGHTS RESERVED.
This document contains proprietary information protected by copyright. No part of this document may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any
purpose without the written permission of Quest Software, Inc. (“Quest”).
The information in this document is provided in connection with Quest products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of
Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE
LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND
DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY
DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with
respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to
specifications and product descriptions at any time without notice. Quest does not make any commitment to update
the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software World Headquarters
LEGAL Dept
5 Polaris Way
Aliso Viejo, CA 92656
www.quest.com
email: legal@quest.com
Refer to our Web site for regional and international office information.
Trademarks
Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure,
Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight,
ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer,
DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile,
InTrust, Invirtus, iToken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats,
Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!,
PowerGUI, Quest Central, Quest vToolkit, Quest vWorkSpace, ReportADmin, RestoreADmin, ScriptLogic, Security
Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab,
Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vAutomator, vControl,
vConverter, vFoglight, vOptimizer, vRanger, Vintela, Virtual DBA, VizionCore, Vizioncore vAutomation Suite,
Vizioncore vBackup, Vizioncore vEssentials, Vizioncore vMigrator, Vizioncore vReplicator, WebDefender, Webthority,
Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America
and other countries. Other trademarks and registered trademarks used in this guide are property of their respective
owners.
Updated—[MONTH, YEAR]
5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | E-MAIL sales@quest.com
If you are located outside North America, you can find local office information on our Web site.
TECHNICAL BRIEF
About Quest Software, Inc.
Quest simplifies and reduces the cost of managing IT for more than 100,000 customers
worldwide. Our innovative solutions make solving the toughest IT management problems
easier, enabling customers to save time and money across physical, virtual and cloud
environments. For more information about Quest go to www.quest.com.
Contacting Quest Software
PHONE	 800.306.9329 (United States and Canada)
		 If you are located outside North America, you can find your
		 local office information on our Web site.
E-MAIL	 sales@quest.com
MAIL	 Quest Software, Inc.
		 World Headquarters
		 5 Polaris Way
		 Aliso Viejo, CA 92656
		 USA
Contacting Quest Support
Quest Support is available to customers who have a trial version of a Quest product or who
have purchased a commercial version and have a valid maintenance contract.
Quest Support provides around-the-clock coverage with SupportLink, our Web self-service.
Visit SupportLink at https://support.quest.com.
SupportLink gives users of Quest Software products the ability to:
•	 Search Quest’s online Knowledgebase
•	 Download the latest releases, documentation, and patches for Quest products
•	 Log support cases
•	 Manage existing support cases
View the Global Support Guide for a detailed explanation of support programs, online services,
contact information, and policies and procedures.
© 2010 Quest Software, Inc.
ALL RIGHTS RESERVED.
Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective
owners. TBD-VirtWithConfidence-US-EH20101109

More Related Content

What's hot

Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions Array Networks
 
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualizationncceconnect
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationEMC
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machinesVaibhav Khanna
 
Virtualization
VirtualizationVirtualization
VirtualizationYansi Keim
 
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Simplilearn
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overviewwebhostingguy
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisationAlessandro Guli
 
Server virtualization
Server virtualizationServer virtualization
Server virtualizationofsorganizer
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Sarbjeet Singh
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulizationAJIT NEGI
 
Virtulization
VirtulizationVirtulization
VirtulizationAntu Sabu
 

What's hot (20)

Types of Virtualization Solutions
Types of Virtualization SolutionsTypes of Virtualization Solutions
Types of Virtualization Solutions
 
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of VirtualizationNCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
NCCE 2011 - Virtualization 101: The Fundamentals of Virtualization
 
Virtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of VirtualizationVirtualization 2.0: The Next Generation of Virtualization
Virtualization 2.0: The Next Generation of Virtualization
 
Operating system 16 virtual machines
Operating system 16 virtual machinesOperating system 16 virtual machines
Operating system 16 virtual machines
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
Virtualization Explained | What Is Virtualization Technology? | Virtualizatio...
 
Virtualization.ppt
Virtualization.pptVirtualization.ppt
Virtualization.ppt
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
 
Different types of virtualisation
Different types of virtualisationDifferent types of virtualisation
Different types of virtualisation
 
Server virtualization
Server virtualizationServer virtualization
Server virtualization
 
Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)Cloud computing using virtualization (Virtual Data Center)
Cloud computing using virtualization (Virtual Data Center)
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
Cloud Computing using virtulization
Cloud Computing using virtulizationCloud Computing using virtulization
Cloud Computing using virtulization
 
Virtulization
VirtulizationVirtulization
Virtulization
 
Virtualization- Cloud Computing
Virtualization- Cloud ComputingVirtualization- Cloud Computing
Virtualization- Cloud Computing
 
Virtualization
VirtualizationVirtualization
Virtualization
 

Viewers also liked

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecksbenscheerer
 
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...cweil
 
The Changing Role of Women in Kenya
The Changing Role of Women in KenyaThe Changing Role of Women in Kenya
The Changing Role of Women in Kenyacweil
 
About Me!!!!
About Me!!!!About Me!!!!
About Me!!!!shall14
 
Course Information For Advanced 2 Students 1
Course Information For Advanced 2 Students 1Course Information For Advanced 2 Students 1
Course Information For Advanced 2 Students 1clila
 
Food chain and healthy eating powerpoint
Food chain and healthy eating powerpointFood chain and healthy eating powerpoint
Food chain and healthy eating powerpointlindseysmall
 
Food chain and healthy eating powerpoint
Food chain and healthy eating powerpointFood chain and healthy eating powerpoint
Food chain and healthy eating powerpointlindseysmall
 
Social Studies
Social StudiesSocial Studies
Social Studiessebastian
 
Trabajo andres herrera mancera
Trabajo andres herrera manceraTrabajo andres herrera mancera
Trabajo andres herrera mancerasebastian
 
Share Week Four Upload
Share Week Four UploadShare Week Four Upload
Share Week Four UploadMark Moore
 
About Me!!!!
About Me!!!!About Me!!!!
About Me!!!!shall14
 
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...cweil
 
Trabajo chachan map
Trabajo chachan mapTrabajo chachan map
Trabajo chachan mapsebastian
 
Jj Nair Powerpoint
Jj Nair PowerpointJj Nair Powerpoint
Jj Nair Powerpointjjnair
 
Analysing Obamas Victory Speech
Analysing  Obamas Victory SpeechAnalysing  Obamas Victory Speech
Analysing Obamas Victory Speechclila
 
All About Me Powerpoint
All About Me PowerpointAll About Me Powerpoint
All About Me PowerpointAmber Bauerly
 

Viewers also liked (17)

Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
 
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...
A Kaleidoscope of Food in Kenya by Colette Weil Parrinello, FACES Magazine, M...
 
The Changing Role of Women in Kenya
The Changing Role of Women in KenyaThe Changing Role of Women in Kenya
The Changing Role of Women in Kenya
 
About Me!!!!
About Me!!!!About Me!!!!
About Me!!!!
 
Course Information For Advanced 2 Students 1
Course Information For Advanced 2 Students 1Course Information For Advanced 2 Students 1
Course Information For Advanced 2 Students 1
 
Food chain and healthy eating powerpoint
Food chain and healthy eating powerpointFood chain and healthy eating powerpoint
Food chain and healthy eating powerpoint
 
Food chain and healthy eating powerpoint
Food chain and healthy eating powerpointFood chain and healthy eating powerpoint
Food chain and healthy eating powerpoint
 
Social Studies
Social StudiesSocial Studies
Social Studies
 
Trabajo andres herrera mancera
Trabajo andres herrera manceraTrabajo andres herrera mancera
Trabajo andres herrera mancera
 
Share Week Four Upload
Share Week Four UploadShare Week Four Upload
Share Week Four Upload
 
Singing!
Singing!Singing!
Singing!
 
About Me!!!!
About Me!!!!About Me!!!!
About Me!!!!
 
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...
Baseball is a Way of Life in the Dominican Republic by Colette Weil Parrinell...
 
Trabajo chachan map
Trabajo chachan mapTrabajo chachan map
Trabajo chachan map
 
Jj Nair Powerpoint
Jj Nair PowerpointJj Nair Powerpoint
Jj Nair Powerpoint
 
Analysing Obamas Victory Speech
Analysing  Obamas Victory SpeechAnalysing  Obamas Victory Speech
Analysing Obamas Victory Speech
 
All About Me Powerpoint
All About Me PowerpointAll About Me Powerpoint
All About Me Powerpoint
 

Similar to Virtualize With Confidence

Managing the move to virtualization and cloud
Managing the move to virtualization and cloudManaging the move to virtualization and cloud
Managing the move to virtualization and cloudBhaskar Jayaraman
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)Chet Fincke
 
brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)Vince Garr
 
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosAccenture Italia
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookNuno Alves
 
whitepapertableauforenterprise_0
whitepapertableauforenterprise_0whitepapertableauforenterprise_0
whitepapertableauforenterprise_0AN_ ANALYTICS
 
whitepapertableauforenterprise_0
whitepapertableauforenterprise_0whitepapertableauforenterprise_0
whitepapertableauforenterprise_0S. Hanau
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessCitrix
 
Vce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironmentsVce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironmentsItzik Reich
 
AdroitLogic Integration Platform Server (IPS) Whitepaper
AdroitLogic Integration Platform Server (IPS) WhitepaperAdroitLogic Integration Platform Server (IPS) Whitepaper
AdroitLogic Integration Platform Server (IPS) WhitepaperAdroitLogic
 
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft Private Cloud
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server EMC
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxARIV4
 
Managing Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceManaging Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceIBM India Smarter Computing
 
Software architecture-patterns
Software architecture-patternsSoftware architecture-patterns
Software architecture-patternspedro
 
Software arquitectura patron diseño
Software arquitectura patron diseñoSoftware arquitectura patron diseño
Software arquitectura patron diseñopedro
 

Similar to Virtualize With Confidence (20)

Cloud security (domain6 10)
Cloud security (domain6 10)Cloud security (domain6 10)
Cloud security (domain6 10)
 
Managing the move to virtualization and cloud
Managing the move to virtualization and cloudManaging the move to virtualization and cloud
Managing the move to virtualization and cloud
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)
 
brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)brocade-five-pillars-federal-data-centers-wp (1)
brocade-five-pillars-federal-data-centers-wp (1)
 
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery ScenariosACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
ACIC Rome & Veritas: High-Availability and Disaster Recovery Scenarios
 
TermPaper
TermPaperTermPaper
TermPaper
 
Citrix Virtual Desktop Handbook
Citrix Virtual Desktop HandbookCitrix Virtual Desktop Handbook
Citrix Virtual Desktop Handbook
 
whitepapertableauforenterprise_0
whitepapertableauforenterprise_0whitepapertableauforenterprise_0
whitepapertableauforenterprise_0
 
whitepapertableauforenterprise_0
whitepapertableauforenterprise_0whitepapertableauforenterprise_0
whitepapertableauforenterprise_0
 
Netscaler for mobility and secure remote access
Netscaler for mobility and secure remote accessNetscaler for mobility and secure remote access
Netscaler for mobility and secure remote access
 
Clustering overview2
Clustering overview2Clustering overview2
Clustering overview2
 
Vce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironmentsVce vdi reference_architecture_knowledgeworkerenvironments
Vce vdi reference_architecture_knowledgeworkerenvironments
 
AdroitLogic Integration Platform Server (IPS) Whitepaper
AdroitLogic Integration Platform Server (IPS) WhitepaperAdroitLogic Integration Platform Server (IPS) Whitepaper
AdroitLogic Integration Platform Server (IPS) Whitepaper
 
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server
 
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docxMEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
MEDICAL FACILITY ANALYSIS2MEDICAL FACILITY ANALYSIS16.docx
 
Managing Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User ExperienceManaging Complexity in the x86 Data Center: The User Experience
Managing Complexity in the x86 Data Center: The User Experience
 
Software architecture-patterns
Software architecture-patternsSoftware architecture-patterns
Software architecture-patterns
 
Software arquitectura patron diseño
Software arquitectura patron diseñoSoftware arquitectura patron diseño
Software arquitectura patron diseño
 

Virtualize With Confidence

  • 1. TECHNICAL BRIEF The Easy Way to Ensure Uptime for Your Critical Applications and Dependent Infrastructure Written by Ben Scheerer Quest Server Virtualization Group Quest Software Inc. How to Virtualize with Confidence
  • 2. How to Virtualize With Confidence 2 Contents Introduction ....................................................................................................................................................................3 How to Virtualize With Confidence.................................................................................................................................4 Challenges of Virtualizing Critical Infrastructure .........................................................................................................4 Visibility for Accurately and Quickly Resolving Performance Issues………………………………………………..…….5 From Detection to Diagnosis and Resolution……………………………………………………………………………..….9 Conclusion………………………………………………………………………………………………………………………...10 About the Author………………………………………………………………………………………………………………….11
  • 3. How to Virtualize With Confidence 3 Introduction Many organizations are successfully virtualizing and consolidating the “low-hanging fruit” such as file/print servers, non-critical applications and the like. As virtualized workloads continue their upward trend, the next steps are almost quantum leaps. The leaps are commonly made into both critical infrastructure (e.g., Microsoft Active Directory) and tier 1 packaged applications (e.g., Microsoft Exchange). What makes these leaps? Primarily it’s because so many organizations are ill-prepared or poorly equipped with the tools and/or processes to manage availability and uptime deep into the layers of critical application infrastructure. Problems worsen when organizations must deal with the complexity of mixed physical/virtual implementations in which only partial components are virtualized, while others still reside on physical servers. As you continue to virtualize more and more of this critical infrastructure, you want to be 100 percent sure you can deliver the performance and uptime your stakeholders expect. The key to gaining confidence is proper monitoring and management of your entire environment -- and that means reducing risk and increasing efficiency. In this technical brief, we’ll discuss the challenges you’ll face in doing so. You’ll also learn what you need to overcome the challenges, and how one powerful solution provides the most extensive set of capabilities on the market, yet is easy to use. You will learn to worry less and less about keeping your users happy and maintaining availability.
  • 4. How to Virtualize With Confidence 4 How to Virtualize With Confidence Challenges of Virtualizing Critical Infrastructure When organizations virtualize critical infrastructure components, such as Microsoft Active Directory (AD), they face new and unique challenges. Typically, administration of AD proves more difficult than expected because of the difficulties of identifying and understanding the demands of replication, performance and availability. These difficulties are compounded when AD resides in a mixed physical/virtual environment. That’s because administrators must pinpoint precisely where problems reside—are they in the underlying infrastructure (physical or virtual), or within virtualization technology itself? The search for answers compels administrators to address the following:  Understanding the AD component relationships between forests, domains, sites and other infrastructure in mixed physical/virtual environments  Detecting, diagnosing and resolving performance and availability issues affecting AD and underlying infrastructure  Communicating state- and service-quality information to stakeholders The same difficulties surface when virtualizing into tier 1 applications (e.g., Microsoft Exchange). With Exchange, administrators must manage across both physical and virtual boundaries, as well as accurately identify and understand the causes of performance and availability issues. Exchange also poses unique difficulties in exposing state and health information in relation to virtual environments. Current management tools may fall short in supporting needs such as:  Understanding the relationships and interactions between Exchange application components (roles, servers and sites) plus supporting infrastructure  Detecting, diagnosing and resolving performance and availability problems specific to the Exchange application environment  Communicating state- and service-quality information to stakeholders efficiently and thoroughly
  • 5. How to Virtualize With Confidence 5 Visibility for Accurately and Quickly Resolving Performance Issues The inherent risk in virtualizing critical tier 1 applications and infrastructure lies in both ensuring and communicating the vital state and heath information of the virtual and physical infrastructures. To do so, organizations must adopt a solution that is not only virtual-aware, but also virtual-exploitive. This solution should deliver capabilities for diagnosing, detecting and resolving issues in the virtual and physical infrastructures side-by-side Furthermore, accurate diagnosis must allow a drill-down into the root cause of issues in the infrastructure. For example, if the Exchange e-mail service is experiencing delays related to a memory problem, the best approach would be: first, to identify the locations of the components where problems exist (in both virtual or physical environments); then, if the problem is in the virtual infrastructure, administrators must be able to drill down to find it quickly, as well as obtain details about the alerts and visual presentation of the situation (for example, high CPU- ready values on the VMware ESX server). Finally, administrators must be able to access either guidance on how to resolve the problem, or launch an in-context automated workflow to correct it. Figure 1 shows ideal visibility of the virtualized Exchange Server (virtualized state indicated by the blue tag in lower left corner of server icon), as well as a quick view of the health of the supporting four core resources and the common monitoring components:  CPU  Memory  Network  Storage  Exchange Domain Controller Connectivity Figure 1 also shows a dashboard that provides extensive visibility into resources highlighted by spinners, send/receive and read/write motion indicators that change color on overall consumption or deviation from normal values. This allows administrators to quickly detect, diagnose and resolve problems.
  • 6. How to Virtualize With Confidence 6 Figure 1: vFoglight provides extensive visibility into the virtualized state and health of Exchange Visibility must not only extend deeply into the AD and Exchange virtual and physical layers, but it must also be able to reveal the information required for successfully managing the environment across the virtualized layer and within the critical application infrastructure. For AD, visibility and analysis of key components—including forests, domains, sites and domain controllers—must encompass both broad and granular data. With Exchange, key components to monitor include roles, servers and sites. Figure 2 presents a “perspectives” view that includes data on critical components of AD and Exchange in both VMware and Windows environments.
  • 7. How to Virtualize With Confidence 7 Figure 2: This “perspectives” view provides insight of AD and Exchange components in both physical and virtual environments. With the data provided in Figure 2, administrators can get a quick assessment of the current state of the environments. They can conduct further investigations into issues using color-coded symbols, which lead them to problem areas. By clicking the “Explore” button, they can drill down to details. Figure 3 shows an example of a drill- down into the data for two virtual servers hosting domain controllers in a caution state.
  • 8. How to Virtualize With Confidence 8 Figure 3: Presentation of detailed data on health of AD and its associated components after administrators drill down through the interface. From Detection to Diagnosis and Resolution Visual cues, along with essential alerts and reports, provide a clear understanding of the health of both virtual and physical environments. These capabilities guide administrators to accurately diagnose problems and fix them quickly. This level of management must provide:  Visibility through logical and architectural representations of the AD and Exchange state and relationships, including associations to the physical and virtual infrastructure  Out-of-the-box alerts, with expert advice, to help administrators reduce mean time to resolution (MTTR) for incidents and problems affecting AD and Exchange performance and availability  Service-level performance and availability reports to show how AD and Exchange infrastructure is supporting the business An effective solution must help administrators accurately identify the root cause of issues and resolve them quickly. Moreover, the solution must provide views that show data about the critical infrastructure and applications from the operating system to the hypervisor (if applicable).
  • 9. How to Virtualize With Confidence 9 Conclusion Success in server virtualization depends on innovative performance-management technologies and practices. Examining the virtualization layer in depth with a solution specifically designed for managing virtualized environments from the ground up is essential. When virtualizing AD and Exchange environments, the solution must be built to manage and monitor performance across the multiple, diverse components in both physical and virtual environments. The ability to detect, diagnose and resolve issues related to their interdependent components is also necessary. Quest® vFoglight®, along with the Foglight® for Active Directory and Foglight® for Exchange cartridges provide the capabilities for managing the entire infrastructure with greater efficiency and less risk. They allow administrators to detect, diagnose and resolve problems affecting AD and Exchange -- as well as related components -- for both virtual and physical environments. With vFoglight, administrators can visualize the AD and Exchange state and relationships through logical and architectural representations. They can also use out-of-the-box alerts and built-in, expert advice to maintain performance and availability. Service level agreement reports show how effective management of the environment supports the business.
  • 10. How to Virtualize With Confidence 10 About the Author Ben manages product marketing for the Quest vFoglight virtualization monitoring solutions. His 18 years of industry experience includes CA, Inc. and Vizioncore (which Quest acquired). Ben has served in a variety of roles, including software sales and as consultant for product and solutions marketing. He speaks frequently at industry events and has published a host of articles and white papers on IT management topics. Ben holds a master’s degree in computer information systems from the University of Denver as well as a bachelor’s degree in marketing from Western Michigan University. He is ITIL ® V3 Foundation-certified.
  • 11. How to Virtualize With Confidence 11 © 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose without the written permission of Quest Software, Inc. (“Quest”). The information in this document is provided in connection with Quest products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: Quest Software World Headquarters LEGAL Dept 5 Polaris Way Aliso Viejo, CA 92656 www.quest.com email: legal@quest.com Refer to our Web site for regional and international office information. Trademarks Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure, Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight, ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer, DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile, InTrust, Invirtus, iToken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats, Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!, PowerGUI, Quest Central, Quest vToolkit, Quest vWorkSpace, ReportADmin, RestoreADmin, ScriptLogic, Security Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab, Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vAutomator, vControl, vConverter, vFoglight, vOptimizer, vRanger, Vintela, Virtual DBA, VizionCore, Vizioncore vAutomation Suite, Vizioncore vBackup, Vizioncore vEssentials, Vizioncore vMigrator, Vizioncore vReplicator, WebDefender, Webthority, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. Other trademarks and registered trademarks used in this guide are property of their respective owners. Updated—[MONTH, YEAR]
  • 12. 5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | E-MAIL sales@quest.com If you are located outside North America, you can find local office information on our Web site. TECHNICAL BRIEF About Quest Software, Inc. Quest simplifies and reduces the cost of managing IT for more than 100,000 customers worldwide. Our innovative solutions make solving the toughest IT management problems easier, enabling customers to save time and money across physical, virtual and cloud environments. For more information about Quest go to www.quest.com. Contacting Quest Software PHONE 800.306.9329 (United States and Canada) If you are located outside North America, you can find your local office information on our Web site. E-MAIL sales@quest.com MAIL Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a commercial version and have a valid maintenance contract. Quest Support provides around-the-clock coverage with SupportLink, our Web self-service. Visit SupportLink at https://support.quest.com. SupportLink gives users of Quest Software products the ability to: • Search Quest’s online Knowledgebase • Download the latest releases, documentation, and patches for Quest products • Log support cases • Manage existing support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policies and procedures. © 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBD-VirtWithConfidence-US-EH20101109