This document discusses best practices for deploying Windows Server 2008 Hyper-V and System Center Virtual Machine Manager 2008. It provides an overview of Hyper-V functionality and deployment strategies. It also covers Virtual Machine Manager architecture, requirements, installation, host and cluster configuration, delegation, and Performance and Resource Optimization capabilities.
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceStarWind Software
High availability in a virtualized workload may require to sacrifice failover cluster performance. Using an optimized for virtualization approach on data storage and virtual machines placement and protection will give you desired boost of performance.
The presentation shows how to:
- Achieve true Hyper-V cluster high availability with just 2 Hyper-V hosts and zero storage hardware
- Boost Hyper-V cluster performance by configuring automatic dynamic optimization
- Effectively track VMs resources usage
- Save an extra 30% of Hyper-V cluster resources by utilizing agentless antivirus
Hyper-V vs. vSphere: Understanding the DifferencesSolarWinds
For more information on Virtualization Manager visit: http://www.solarwinds.com/virtualization-manager.aspx
Watch this webcast: http://www.solarwinds.com/resources/webcasts/hyper-v-vs-vsphere-understanding-the-differences.html
Watch this webinar with Scott Lowe, Founder and Managing Consultant at The 1610 Group, and SolarWinds virtualization expert Jonathan Reeve where they discuss “Hyper-V vs. vSphere: Understanding the differences.”
The virtualization market is abuzz with talk of different hypervisors – most prominently VMware ESX® versus Microsoft Hyper-V®, who together own over 90% of the market. Small and medium businesses are already moving quickly toward Hyper-V, and a growing number of larger organizations are beginning to put plans in place to transition some portion of their environment from ESX to Hyper-V.
In this webcast we explore the reasons for these changes and the ecosystems for these two platforms both now and in the future. We also take a look ahead to what is known about Hyper-V 3.0 and why it warrants an even deeper look when evaluating hypervisors for your future virtualization deployments.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
How to Optimize Microsoft Hyper-V Failover Cluster and Double PerformanceStarWind Software
High availability in a virtualized workload may require to sacrifice failover cluster performance. Using an optimized for virtualization approach on data storage and virtual machines placement and protection will give you desired boost of performance.
The presentation shows how to:
- Achieve true Hyper-V cluster high availability with just 2 Hyper-V hosts and zero storage hardware
- Boost Hyper-V cluster performance by configuring automatic dynamic optimization
- Effectively track VMs resources usage
- Save an extra 30% of Hyper-V cluster resources by utilizing agentless antivirus
Hyper-V vs. vSphere: Understanding the DifferencesSolarWinds
For more information on Virtualization Manager visit: http://www.solarwinds.com/virtualization-manager.aspx
Watch this webcast: http://www.solarwinds.com/resources/webcasts/hyper-v-vs-vsphere-understanding-the-differences.html
Watch this webinar with Scott Lowe, Founder and Managing Consultant at The 1610 Group, and SolarWinds virtualization expert Jonathan Reeve where they discuss “Hyper-V vs. vSphere: Understanding the differences.”
The virtualization market is abuzz with talk of different hypervisors – most prominently VMware ESX® versus Microsoft Hyper-V®, who together own over 90% of the market. Small and medium businesses are already moving quickly toward Hyper-V, and a growing number of larger organizations are beginning to put plans in place to transition some portion of their environment from ESX to Hyper-V.
In this webcast we explore the reasons for these changes and the ecosystems for these two platforms both now and in the future. We also take a look ahead to what is known about Hyper-V 3.0 and why it warrants an even deeper look when evaluating hypervisors for your future virtualization deployments.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
XenServer, Hyper-V, and ESXi - Architecture, API, and Coding_Humair_Ahmed_
XenServer, Hyper-V, and ESXi hypervisor comparison in regards to market share, architecture/installation, and APIs/coding. Technical details, demos, and code provided. Visit my blog at http://humairahmed.com/blog/.
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
With co-presenter Maninder Singh, delivered a presentation about hypervisors and virtualization technology for an independent topic study project for the Operating System Design (EECS 4221) course at York University, Canada in October 2014.
Virtualization, briefly, is the separation of resources or requests for a service from the underlying physical delivery of that service. It is a concept in which access to a single underlying piece of hardware is coordinated so that multiple guest operating systems can share a single piece of hardware, with no guest operating system being aware that it is actually sharing anything at all.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Поколения виртуальных машин
Автоматическая активация ОС в виртуальных машинах
Что такое Live Migration. Скорость работы, компрессия, миграция с WS2012 на WS2012R2
Живое изменение размера дисков виртуальных машин
Storage QoS, контроль и мониторинг производительности дисковых ресурсов
Клонирование и экспорт запущенных ВМ, экспорт снимков ВМ
Новые возможности в виртуальных машинах с Linux
Дисковая дедупликация для работающий VDI машин, дедупликация CSV
При поддержке "Звезды и С" www.stars-s.ru
Hypervisors are becoming more and more widespread in embedded environments, from automotive to medical and avionics. Their use case is different from traditional server and desktop virtualization, and so are their requirements. This talk will explain why hypervisors are used in embedded, and the unique challenges posed by these environments to virtualization technologies.
Xen, a popular open source hypervisor, was born to virtualize x86 Linux systems for the data center. It is now the leading open source hypervisor for ARM embedded platforms. The presentation will show how the ARM port of Xen differs from its x86 counterpart. It will go through the fundamental design decisions that made Xen a good choice for ARM embedded virtualization. The talk will explain the implementation of key features such as device assignment and interrupt virtualization.
The needs for immediate responsiveness of VMs in the virtualized environments have been on the rise. Several services in SKT also require soft realtime support for virtual machines to substitute the physical machines to achieve high utilization and adaptability. However, consolidated multiple OSes and irregular external events might render the hypervisor infringe on a VM's promptitude. As a solution of this problem, we are improving Xen's credit scheduler by introducing the RT_PRIORITY that guarantees a VM's running at any given point in time as long as credits remains to be burn. It would increase the quality of service and make a VM's behavior predictable on the consolidated environment. In addition, we extend our suggestion to the multi-core environment and even a large number of physical machines by using live migrations.
Hypervisors are a kind of software which runs different virtual systems called virtual machines on a single computer giving the view to guest running on each virtual machine that it is running on its own single computer. This presentation talks about hypervisors and different techniques of their implementation in brief.
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMvwchu
With co-presenter Maninder Singh, delivered a presentation about hypervisors and virtualization technology for an independent topic study project for the Operating System Design (EECS 4221) course at York University, Canada in October 2014.
Virtualization, briefly, is the separation of resources or requests for a service from the underlying physical delivery of that service. It is a concept in which access to a single underlying piece of hardware is coordinated so that multiple guest operating systems can share a single piece of hardware, with no guest operating system being aware that it is actually sharing anything at all.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Поколения виртуальных машин
Автоматическая активация ОС в виртуальных машинах
Что такое Live Migration. Скорость работы, компрессия, миграция с WS2012 на WS2012R2
Живое изменение размера дисков виртуальных машин
Storage QoS, контроль и мониторинг производительности дисковых ресурсов
Клонирование и экспорт запущенных ВМ, экспорт снимков ВМ
Новые возможности в виртуальных машинах с Linux
Дисковая дедупликация для работающий VDI машин, дедупликация CSV
При поддержке "Звезды и С" www.stars-s.ru
Hypervisors are becoming more and more widespread in embedded environments, from automotive to medical and avionics. Their use case is different from traditional server and desktop virtualization, and so are their requirements. This talk will explain why hypervisors are used in embedded, and the unique challenges posed by these environments to virtualization technologies.
Xen, a popular open source hypervisor, was born to virtualize x86 Linux systems for the data center. It is now the leading open source hypervisor for ARM embedded platforms. The presentation will show how the ARM port of Xen differs from its x86 counterpart. It will go through the fundamental design decisions that made Xen a good choice for ARM embedded virtualization. The talk will explain the implementation of key features such as device assignment and interrupt virtualization.
The needs for immediate responsiveness of VMs in the virtualized environments have been on the rise. Several services in SKT also require soft realtime support for virtual machines to substitute the physical machines to achieve high utilization and adaptability. However, consolidated multiple OSes and irregular external events might render the hypervisor infringe on a VM's promptitude. As a solution of this problem, we are improving Xen's credit scheduler by introducing the RT_PRIORITY that guarantees a VM's running at any given point in time as long as credits remains to be burn. It would increase the quality of service and make a VM's behavior predictable on the consolidated environment. In addition, we extend our suggestion to the multi-core environment and even a large number of physical machines by using live migrations.
Hypervisors are a kind of software which runs different virtual systems called virtual machines on a single computer giving the view to guest running on each virtual machine that it is running on its own single computer. This presentation talks about hypervisors and different techniques of their implementation in brief.
Sasha Goldshtein's talk at the SELA Developer Practice (May 2013) that explains the most common vulnerabilities in web applications and demonstrates how to exploit them and how to defend applications against these attacks. Among the topics covered: SQL and OS command injection, XSS, CSRF, insecure session cookies, insecure password storage, and security misconfiguration.
The Rules of Network Automation - Interop/NYC 2014Jeremy Schulman
Starting with "Why", a look at the shifts in the networking industry and how they impact professionals with a focus on network automation options, challenges, and how to start the journey ahead
A technical presentation that accompanied a discussion on the topic of automation various aspects of the peering decision making and provisioning process
Each of the files or classes of a projects source code represents a tree (AST). Looking at dependencies to other classes besides inheritance creates a graph though. Field types and method parameters are also implicit dependencies. Storing this information in a graph database like Neo4j allows for interesting queries and insights. Class-Graph provides that and is available as open-source github project.
This presenation gives a quick history on Hyper-V and discusses the arhcitecture of the vurrent release. It then goes into detail on Hyper-V R2, i.e. the build included in Hyper-V Server 2008 R2 and Windows Server 2008 R2. It includes Live Migration, Cluster Shared Volumes, Virtual Machine Queue, SLAT, Core Parking and Native VHD.
I spoke about:
- The need for machine virtualisation
- Hyper-V architecture and components
- Failover Clustering
- Licensing
- Management- W2008 R2: Cluster Shared Volume and Live Migration
- The possible future
As the invited speaker during Microsoft Technical Partner Community Event @Microsoft KLCC Auditorium , i have presented 3 Key Area: Scalability,Mobility and Delivery High Availabili
In a traditional Xen configuration domain 0 is used for a large number of different functions including running the toolstack(s), backends for network and disk I/O, running the QEMU device model instances, driving the physical devices in the system, handling guest console/framebuffer I/O and miscellaneous monitoring and management functions. Having all these functions in one domain produces a complex environment which is susceptible to shared fate on the failure of any one function, has complex interactions between functions (including resource contention) which makes it difficult to predict performance, and has limited flexibility (such as requiring the same kernel for all device drivers).
""Domain 0 disaggregation"" has been discussed for some time as a way to break out domain 0's functions into separate domains. Doing this enables each domain to be tailored to its function such as using a different kernel or operating system to drive different physical devices. Splitting functions into separate domains removes some of the unintentional interactions such as in-domain resource contention and reduces the system impact of the failure of a single function such as a device driver crash.
Although domain 0 disaggregation is not new it is seldom used in practise and much of its use is focussed on providing enhanced security. Citrix XenServer will be moving towards a disaggregated domain 0 in order to provide better security, scalability, performance, reliability, supportability and flexibility. This talk will describe XenServer's “Windsor” architecture and explain how it will provide the above benefits to customers and users. We will present an overview of the architecture and some early experimental measurements showing the benefits.
Learn about z/VM 6.2: Increasing the Endless Possibilities of Virtualization. Efficiency of one. Flexibility of Many. 40 years of virtualization.For more information, visit http://ibm.co/PNo9Cb.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Hyper V And Scvmm Best Practis
1. Deploying Windows Server
2008 Hyper-V and System
Center Virtual Machine
Manager 2008 Best Practices
Brian Lauge Pedersen
Virtualization Technical Solutions Professional
1
2. Session Objectives And Agenda
Discuss Hyper V deployment strategies
Discuss System Center Virtual Machine
Manager deployment strategies
Understand what is needed to deploy PRO
functionality
Demo: Windows Server 2008 Hyper V
Demo: System Center Virtual Manager
Understand Hyper V performance
2
4. Windows Server 2008 with
Hyper-V Technology
A role of Windows Server 2008 (Std, EE, DC)
Can be installed on both Windows Server 2008 Full
and Core
Production servers can be configured as a minimal
footprint Server Core role
Hypervisor based architecture
Flexible and dynamic virtualization solution
Managed by the Microsoft System Center
family of products
4
5. Provided by:
ISV / IHV / OEM
OS
Microsoft Hyper-V
Microsoft / Citrix (XenSource)
Parent
Child Partitions
Partition
WMI Provider
VMMS
Applications Applications Applications Applications
User Mode
Ring 3
VM Worker
Processes
Xen-Enabled
Windows Supported Non-
Windows OS
Server 2008 Linux Kernel
Hypervisor
Aware OS Linux
Windows Windows
VSP VSC VSC
Kernel Kernel
IHV
Kernel Mode
VMBus
Drivers
Ring 0
Emulation
VMBus VMBus Hypercall Adapter
Ring -1
Windows hypervisor
“Designed for Windows” Server Hardware
5
6. 64-Bit processors with hardware virtualization extensions enabled
Intel-VT
AMD-V
Hardware enabled Data Execution Prevention (DEP) required
AMD (NX no execute bit)
Intel (XD execute disable)
RAM
Parent Partition 1GB
Each Guest + ~21MB overhead
Disk
Parent Partition
Space to store VHDs
Space to store VSS snapshots
Space to store VM snapshots
Network
1 NIC for parent partition management
1+ NICs for Virtual Networks Guest usage
1 NIC for iSCSI (optional)
7. Choosing the building blocks
Build a balanced system Best Practices
Windows Server 2008 x64 Edition EE/DTC
Server Core Installation
Quad processor/Quad Core (16/24 cores)
AMD-V or Intel VT
Memory
2 GB per core minimum (32 GB)
4 GB per core recommended (64 GB)
Storage
4 Gb Fibre Channel
1/10 Gb Iscsi
Networking
1 Gb/E NIC (onboard) for VM
management/cluster heartbeat/migration
1 quad-port Gb/E PCI-E for VMs
7
8. Windows Server frequently deployed
for a single role
Must deploy and service the entire OS in
earlier Windows Server releases
Server Core a new minimal
installation option
Provides essential server functionality
Command Line Interface only, no GUI
Shell
Benefits
Fundamentally improves availability
Less code results in fewer patches and
reduced servicing burden
Low surface area server for targeted
roles
More secure and reliable with less
management
8
10. Hyper-V Storage Best Practices
Performance wise from fastest to slowest…
Fixed Disk VHDs/Pass Through Disks
Slight performance difference
Dynamically Expanding VHDs
Grow as needed
Do not use for production workloads
Pass Through Disks
Pro: VM writes directly to a disk/LUN without
encapsulation in a VHD
Cons:
You can’t use VM snapshots
Dedicating a disk to a vm
10
11. Hyper-V Storage Best Practices
Leverage MPIO solutions to provide SAN path
and bandwidth advantages
Use Pass thru disks for I/O intensive workloads
Database workloads OLTP/DSS
File Servers
Leverage ISCSI on the Host (Best Performance)
Leverage TOE and offload cards
Use ISCSI in the guest for guest clusters
11
13. Parent Partition Virtual machine
Virtual networks bound to Synthetic NIC
physical NICs Legacy NIC
External – limited by the 12 NICs per VM
number of NICs
8 synthetic
Internal - unlimited
4 legacy
Private - unlimited
Up to 10Gb/s
Ethernet NICs only
VLAN support
Network teaming
VLAN Support
Trunking
No Wireless NIC support
13
15. Example:
Server has 4 physical network adapters
NIC 1: Assigned to parent partition for management
NIC 2: Assigned to parent partition for iSCSI
NICs 3/4: Assigned to virtual switches for virtual
machine networking
15
17. Parent
Child Partitions
Partition
VM Worker
Processes
Applications Applications Applications
User
WMI Provider
Mode
VM Service
VM 3
Windows VM 1 VM 2
Server 2008
Windows Linux
Windows
VSC VSC VSC
Kernel Kernel
Kernel
VSP
VS
Kernel
P
Mode
VMBus VMBus VMBus
VMBus
Windows hypervisor Ring -1
Mgmt iSCSI NIC VSwitch 1 VSwitch 2
NIC 1 2 NIC 3 NIC 4
“Designed for Windows” Server Hardware
19. Microsoft Hyper-V Quick Migration
Provides solutions for both planned and unplanned
downtime
Planned downtime
Quickly move virtualized workloads to service
underlying hardware
More common than unplanned
Unplanned downtime
Automatic failover to other nodes (hardware or
power failure)
Not as common and more difficult
19
20. Quick Migration
Fundamentals – Planned
Downtime VHDs
1. Save state Shared Storage
a) Save entire virtual machine
state
2. Move virtual machine
a) Move storage connectivity
from origin to destination
host
3. Restore state and Run Network Connectivity
a) Restore virtual machine and
run
20
21. Quick Migration Storage Best
Practices
Pass-through Disks in a cluster
Provides enhanced I/O performance
Requires VM configuration file to be stored separate from
the virtual machine file
Create file share on the cluster and store VM configuration
files for virtual machines that use pass-thru.
VHD Based
One LUN per VM best practice
Ability to provision more then one VM per LUN but all
failover as a unit
3rd part solutions offer the ability to provision a LUN with
multiple virtual machines with granular failover
21
22. Quick Migration Storage Best
Practices
SAN/iSCSI
Leverage MPIO solutions for path availability and I/O
throughput
Leverage VM provisioning via GUID ID instead of drive letter
?<GUID>
Use Mountvol.exe to find GUID of provisioned LUN
22
24. Ensure your backup solution supports VSS
Support for the VSS writer in Hyper V specifically
Virtual Machine Backup Best practices
Leverage the Hyper V VSS writer to take online
snapshots of virtual machines
System Center Data Protection Manager
Will provide Hyper V VSS snapshots
Ability to quickly recover virtual machines
Replicate snapshots to backup location for DR
24
26. Performance Things to Understand
Guest OS processors/cores are not bound
(affinitized) to physical processsors/cores
Physical Memory Must match the Combined
Memory of All of the Guest Computers
2GB for parent partition + memory of VM +21MB
The parent partition is a Virtual Machine
Only run Ecosystem applications (backup, Antivirus)
Measure Hyper V and Virtual machine performance
using new Hyper Performance counters
29 new Hypervisor related performance counters
26
27. Measuring Processor Usage
Measuring the physical host computer’s (Root
Partition) Processor Capacity
Hyper-V Hypervisor Logical Processor(*)% Total Run Time: The
percentage of time spent by the processor in guest and hypervisor
code.
Measuring Guest Computer Processor Utilization
HyperVisor Hyper-V Logical Processors(*)% Guest Run Time:
27
28. Measure Memory usage
Measuring Available Memory on the Hyper-V Host
Computer:
MemoryAvailable MBytes: Available MBytes is the
amount of physical memory available to processes
running on the computer, in Megabytes.
Same for measuring memory usage in the Virtual
machine
28
30. VMM 2008 Architecture
Administrator’s Self Service Web
Operator’s Web Windows
Console Portal
Console Console PowerShell
Windows® PowerShell
Connector
Virtual Machine Manager Operations Manager
Server Server
Management Interfaces
VMM Library VMware VI3
Server
Virtual Center Server
ESX Host
VM VM VM VM VM
Template
VM VM
VM VM VM VM
ISO VHD Script VM VM VM VM
VM VM
SAN Storage
30
31. VMM 2008 Requirements
VMM 2008 Server requires Windows Server
2008 x64 for installation
PowerShell feature should be added before install
VMM 2008 Console will install on Windows
Server 2003, Windows Vista, and Windows
Server 2008 x86/x64
Non-Windows Server 2008 installations will require
local installation of PowerShell 1.0
VMM 2008 Agent install on Windows Server
2003/2008.
Windows Server 2008 installs require WinRM locally
31
32. VMM 2008 Installation
VMM 2008 Server requires requires Active
Directory for security
Can manage non-AD computers, but needs AD for
installation
Each VMM 2008 component can be separate
servers or on a single server (demo/test)
VMM 2008 can be run inside a VM
Just be aware of the chicken & the egg issue
(understand you will need Server Manager to start
the VMM VM)
32
33. VMM 2008 Scalability
Support 400 hosts 8000 virtual machines per VMM
Server.
Best practice VMM server per datacenter
Split host management by location
Create library servers close to hosts
In branch offices load the library server on the VM
host
Assign to separate spindles for I/O
Replication of library servers
VMM does not provide a built in replication
mechanism
Leverage DFS-R
3rd party replication tools (Doubletake)
33
35. Host and Cluster Configuration
Remote enable the Hyper-V role or Virtual Server installation
Hyper-V can be remotely enabled rather than using Server Manager
Virtual Server can be installed on Windows Server 2003 hosts, but
WinRM needs to be installed first on the host
Easy management of Hyper-V host clusters
Add entire Hyper-V host cluster in a single step
Cluster needs to be created outside of VMM
Automatic detection of node additions/removals
Management of Windows Server 2008 Failover clusters for
Hyper-V
Specify number of node failures you want to sustain but still have all your
HA VMs running
Intelligent Placement ensures that new HA VM creation will not
overcommit the cluster
Node failures automatically trigger overcommit re-calculation
35
36. Placement and Cluster Reserve
Cluster reserve = 1 node
Can the cluster sustain 1 node failure? YES
Place the VM
Clustered Host 1 Clustered Host 2 Clustered Host 3
36
37. Delegation and Self Service
Administrators control access through policies which
designate capabilities
Delegated Administrators
Manage a scoped environment using main UI
Self service user
Web user interface
Manage their own VMs
Quota to limit VMs
Scripting through
PowerShell
37
38. Understanding User Roles
Membership
Membership
Determines which users are part of a particular user
role
Members may be individual users or groups
Members may be in multiple user roles including user
Profile
roles based on different profiles
Profile determines
Scope Which actions are permitted
Which user interface is accessible
How the scope is defined
User Role
Scope determines
Which objects a user may take actions on
38
39. Built-in Profiles
Administrators
Full access to all actions
Full access to all objects
Can use the Admin console or PowerShell
interface
Delegated Administrators
Full access to most actions
Scope can be limited by host groups and
Library servers
Can use the Admin console or PowerShell
interface
Self-Service Users
Limited access to a subset of actions
Scope can be limited by host groups and
Library share
Can use the Self-Service Portal or
PowerShell interface
39
40. Customizing Scopes
Administrators
No scope customization available, Administrators
have access to all objects
Delegated Administrators
Can be limited to one or more host groups including all child objects
Can be limited to one or more Library servers
including all child objects
Self-Service Users
Can be limited to a single host group where
new virtual machines may be created
Can be limited to a single Library share where
new virtual machines can be stored
Can be limited to specific templates to use for new virtual machines
40
41. Delegating Administration
Virtualized Environment
Delegated Administration
Seattle New York
Delegated Administration
Production Dev/Test
Self Service Self Service Self Service
Users Users Users
41
43. Performance And Resource
Optimization (PRO)
Workload and application
aware resource
optimization
Extensible through the
Operations Manager 2007
MP framework
Create policies that VMM
acts upon tips
automatically or manually
Can be applied equally to
both VMware and
Microsoft hosts
Leverage PRO to maximize
the utilization of your
hosts.