This document summarizes storage options and best practices for Hyper-V virtualization. It discusses the different types of storage that can be used with Hyper-V hosts and virtual machines, including direct attached storage, storage area networks, and virtual hard disks. It also provides guidance on topics like storage performance, antivirus exclusion lists, encryption, clustering, and multi-path I/O configuration to optimize storage. Best practices are presented for areas like sizing storage, networking configurations, and high availability solutions.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
Технологии работы с дисковыми хранилищами и файловыми системами Windows Serve...Виталий Стародубцев
##Что такое Storage Replica
##Архитектура и сценарии
##Синхронная и асинхронная репликация
##Междисковая, межсерверная, внутрикластерная и межкластерная репликация
##Дизайн и проектирование Storage Replica
##Нововведения в Windows Server 2016 TP5
##Графический интерфейс управления, и другие возможности - демонстрация и планы развития
##Интеграция Storage Replica с Storage Spaces Direct
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
План вебинара:
##Что такое Storage Spaces Direct?
##Сценарии использования Storage Spaces.
##Описание минимальных требований для Storage Spaces.
##Как настроить Windows Server 2016 Spaces Direct для работы с локальными дисками сервера?
##Что такое Storage Replica?
##Разница подходов синхронной и асинхронной репликации.
##Какие технологии репликации для каких задач использовать (DFS-R, Hyper-V Repica, SQL AlwaysOn, Exchange DAG) - и как это комбинируется с новыми возможностями Windows Server 2016?
##Что такое ReFS и чем она отличается в Server 2016 от предыдущих изданий ОС?
##Что даёт использование ReFS для виртуальных машин Hyper-V. Сценарии и возможности.
##Общие изменения Storage технологий в Windows Server 2016.
Sasha Goldshtein's talk at the SELA Developer Practice (May 2013) that explains the most common vulnerabilities in web applications and demonstrates how to exploit them and how to defend applications against these attacks. Among the topics covered: SQL and OS command injection, XSS, CSRF, insecure session cookies, insecure password storage, and security misconfiguration.
Авторский учебный курс от Архитектора Microsoft Алексея Кибкало.
Что такое Hyper-V
Версии Windows Server 2012 Hyper-V
Аппаратные требования к Windows Server 2012 Hyper-V
Установка Hyper-V
Сетевые возможности Windows Server 2012 Hyper-V
Что такое Live Migration
Высокодоступные кластеры Windows Server 2012 Hyper-V
Аварийное восстановление и Hyper-V Replica
Азы управления при помощи System Center
При поддержке "Звезды и С" www.stars-s.ru
Технологии работы с дисковыми хранилищами и файловыми системами Windows Serve...Виталий Стародубцев
##Что такое Storage Replica
##Архитектура и сценарии
##Синхронная и асинхронная репликация
##Междисковая, межсерверная, внутрикластерная и межкластерная репликация
##Дизайн и проектирование Storage Replica
##Нововведения в Windows Server 2016 TP5
##Графический интерфейс управления, и другие возможности - демонстрация и планы развития
##Интеграция Storage Replica с Storage Spaces Direct
This document describes how XenServer provides and keeps track of the storage supplied to its guests. The first section
is a reminder of how Linux looks at storage and the second section builds on that to explain XenServer storage. Basic
knowledge of Linux is required, as some standard tools are used.
План вебинара:
##Что такое Storage Spaces Direct?
##Сценарии использования Storage Spaces.
##Описание минимальных требований для Storage Spaces.
##Как настроить Windows Server 2016 Spaces Direct для работы с локальными дисками сервера?
##Что такое Storage Replica?
##Разница подходов синхронной и асинхронной репликации.
##Какие технологии репликации для каких задач использовать (DFS-R, Hyper-V Repica, SQL AlwaysOn, Exchange DAG) - и как это комбинируется с новыми возможностями Windows Server 2016?
##Что такое ReFS и чем она отличается в Server 2016 от предыдущих изданий ОС?
##Что даёт использование ReFS для виртуальных машин Hyper-V. Сценарии и возможности.
##Общие изменения Storage технологий в Windows Server 2016.
Sasha Goldshtein's talk at the SELA Developer Practice (May 2013) that explains the most common vulnerabilities in web applications and demonstrates how to exploit them and how to defend applications against these attacks. Among the topics covered: SQL and OS command injection, XSS, CSRF, insecure session cookies, insecure password storage, and security misconfiguration.
The Rules of Network Automation - Interop/NYC 2014Jeremy Schulman
Starting with "Why", a look at the shifts in the networking industry and how they impact professionals with a focus on network automation options, challenges, and how to start the journey ahead
A technical presentation that accompanied a discussion on the topic of automation various aspects of the peering decision making and provisioning process
Each of the files or classes of a projects source code represents a tree (AST). Looking at dependencies to other classes besides inheritance creates a graph though. Field types and method parameters are also implicit dependencies. Storing this information in a graph database like Neo4j allows for interesting queries and insights. Class-Graph provides that and is available as open-source github project.
At Emerson Exchange 2009, Martin Berutti presents on the business benefits, requirements, and steps for building a Virtual DeltaV system with a virtual plant and I/O.
What's New In 2008 R2 Hyper V and VMM 2008 R2 - Updated Oct 2009Aidan Finn
This is the presentation I gave at the UK/Ireland MVP open day in Reading in October 2009. There is no NDA content in here. It's an updated and expanded version of the presentation.
The Unofficial VCAP / VCP VMware Study GuideVeeam Software
Veeam® is happy to provide the VMware community with new, unofficial study guides prepared by VMware certified professionals Jason Langer and Josh Coen.
Free VCP5-DCV Study Guide
In this 136-page study guide Jason and Josh cover all seven of the exam blueprint sections to help prepare you for the VCP exam.
Free VCAP5-DCA Study Guide
For those currently holding their VCP certification and want to take it up a notch, Jason and Josh have you covered with the 248-page VCAP5-DCA study guide. Using this study guide along with hands-on lab time will help you in the three and a half hours, lab-based VCAP5-DCA exam.
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. http://www.allpass4sure.com/microsoft-pdf-70-410.html
SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clust...Louis Göhl
Come and learn about all the new enhancements that are going to be delivered in Failover Clustering with Windows Server 2008 R2. This session looks at improvements since Windows Server 2008 including an overview of Cluster Shared Volumes (CSV), live migration, enhanced validation, PowerShell support, new HA workloads, improvements to existing workloads, supportability enhancements, and other exciting features designed to help you achieve even HIGHER availability for your Failover Cluster.
Citrix vision and product highlights november 2011Louis Göhl
Scripted customer facing high level presentation that outlines the Citrix vision and strategy set in the personal, private and public cloud framework. Includes latest messaging from Synergy Barcelona.
SVR402: DirectAccess Technical Drilldown, Part 2 of 2: Putting it all together.Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
SVR401: DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and transition te...Louis Göhl
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
This is a level 200 - 300 presentation.
It assumes:
Good understanding of vCenter 4, ESX 4, ESXi 4.
Preferably hands-on
We will only cover the delta between 4.1 and 4.0
Overview understanding of related products like VUM, Data Recovery, SRM, View, Nexus, Chargeback, CapacityIQ, vShieldZones, etc
Good understanding of related storage, server, network technology
Target audience
VMware Specialist: SE + Delivery from partners
This is a level 200 - 300 presentation.
It assumes:
Good understanding of vCenter 4, ESX 4, ESXi 4.
Preferably hands-on
We will only cover the delta between 4.1 and 4.0
Overview understanding of related products like VUM, Data Recovery, SRM, View, Nexus, Chargeback, CapacityIQ, vShieldZones, etc
Good understanding of related storage, server, network technology
Target audience
VMware Specialist: SE + Delivery from partners
Hyper v and live migration on cisco unified computing system - virtualized on...Louis Göhl
Learn how Cisco's new unified computing architecture, purpose built for virtualization, with Microsoft's Windows Server 2008 R2 Hyper-V and Live Migration, allow administrations to quickly allocate additional compute and storage resources for on-demand provisioning of new applications and users.
UNC309 - Getting the Most out of Microsoft Exchange Server 2010: Performance ...Louis Göhl
Selecting the right server hardware for an Exchange 2010 deployment becomes much easier when you know the product team's scalability and performance guidelines. This session provides a look at the product team's guidance for the processor and memory requirements of each server role in Exchange 2010. A number of key performance enhancements from this release are discussed, and you also learn about how to use related tools like the Exchange Storage Calculator, Exchange Profile Analyzer, Loadgen, and Jetstress to take the guesswork out of server sizing.
SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft Syst...Louis Göhl
This session focuses on the new capabilities of Windows Server 2008 R2 Hyper-V. The session also covers the base architecture of Hyper-V and provides guidance on key areas like storage management, performance, and more.
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?Louis Göhl
Windows Server 2008 R2 is here, with new tools and utilities for the directory service IT pro to help you manage and maximise the potential of your Active Directory. What's going to be your favourite new feature? Maybe it's the Best Practice Analyser that will scan your infrastructure and point out both compliant and noncompliant aspects of your environment together with suggestions for improvements. Do you want tools to simplify your day-to-day management of the AD? There's a new kid on the block, the Active Directory Administrative Center. Built on Windows PowerShell technology it provides a rich GUI allowing you to perform common Active Directory tasks through both data-driven and task-driven navigation. Not a GUI fan? Then R2 brings you more than 85 PowerShell Cmdlets to allow you to manage, diagnose, and automate AD tasks from the command-line or PowerShell scripts. Maybe your favourite will be the recycle bin allowing you to recover deleted objects while the directory is online or the ability to perform offline domain join allowing you to streamline your deployments. There are more choices, come to this high-energy, fast paced, demo rich presentation and get all the details
SIA311 Better Together: Microsoft Exchange Server 2010 and Microsoft Forefron...Louis Göhl
Come learn how Forefront and Exchange Server 2010 work better together! This session covers how Forefront Protection 2010 for Exchange Server (FPE) and Forefront Online Protection for Exchange (FOPE) will facilitate protection of Microsoft Exchange Server 2010 from malware and unsolicited mail.
MGT310 Reduce Support Costs and Improve Business Alignment with Microsoft Sys...Louis Göhl
System Center Service Manager, through the power of its integrated platform, reduces costs, improves service levels, delivers informed decision making and reduces the burden of compliance. In this session learn how Service Manager, now in Beta Two, lowers the cost of incident and problem resolution and provides a streamlined approach to change management by providing integrated knowledge of configuration items and the ability to easily assess the current health state of IT services by seamlessly integrating the activities between Service Manager, System Center Operations Manager and System Center Configuration manager. Also see how Service Manager will deliver a compliance and risk process management pack that harmonises over 350 regulatory standards into a comprehensive set of control objectives that can be managed and tracked.
MGT300 Using Microsoft System Center to Manage beyond the Trusted DomainLouis Göhl
Numerous Microsoft technologies are now taking advantage of digital certificate-based authentication to enable the support for and management of systems outside trusted networks and domains. Join us to learn how you can use digital certificates with System Center to extend your management capabilities beyond your immediate environment, and enable a single management infrastructure to manage systems and IT services across multiple trusted and untrusted domains.
MGT220 - Virtualisation 360: Microsoft Virtualisation Strategy, Products, and...Louis Göhl
Learn about the Microsoft virtualisation strategy from the datacenter, to the desktop, to the cloud--and how it will help you cut costs and build value. In this session we review and demonstrate Microsoft virtualisation products and discuss how you can use them to solve today's IT issues (cost cutting, consolidation, business continuity, green IT), develop new computing solutions (VDI) and build a foundation for a more dynamic IT environment, including cloud computing. The session reviews all of the latest Microsoft virtualisation products, including Application Virtualization (App-V), Microsoft Enterprise Desktop Virtualization (MED-V), Windows Server 2008 with Hyper-V, and Microsoft Hyper-V Server, as well as the System Center management platform (including Virtual Machine Manager 2008). Learn about the innovative pricing and licensing structure that allows further savings to lower both acquisition and ongoing ownership costs. Learn how you can enable IT to become a cost cutting mechanism with Microsoft virtualisation and management technologies.
CLI319 Microsoft Desktop Optimization Pack: Planning the Deployment of Micros...Louis Göhl
You're excited about the new features in App-V 4.5, but where do you get started? This talk is meant to guide IT administrators through the App-V deployment decision process. Specifically, we discuss the various deployment types, pros and cons for each type of deployment, and performance and scalability issues. By the end of the presentation, IT administrators will be able to identify the deployment that is best suited for their preferences and infrastructure.
Windows Virtual Enterprise Centralized DesktopLouis Göhl
Virtualization brings about new use cases that did not previously exist in traditional desktop environments. These use cases include the ability to create multiple desktops dynamically, enable user access to multiple virtual machines (VMs) simultaneously, and move desktop VMs across multiple platforms, especially in load-balancing and disaster recovery situations. Microsoft designed Windows Virtual Enterprise Centralized Desktop (VECD) to enable organizations to license virtual copies of Windows client operating systems in virtual environments.
http://www.microsoft.com/windows/enterprise/solutions/virtualization/licensing.aspx
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Storage and hyper v - the choices you can make and the things you need to know [svr308]
1.
2. Storage & Hyper-V: The Choices you can make and the things you need to know Vijay Tewari Principal Program Manager Windows Server, Hyper-V SVR308
3. Session Objectives And Takeaways Recap Hyper-V Architecture Hyper-V storage (host and VM’s) Storage Enhancements with Windows Server 2008 R2 Hyper-V Tips/tricks, Best Practices and guidelines
5. Hyper-V Architecture Provided by: OS ISV / IHV / OEM VM Worker Processes Microsoft Hyper-V Microsoft Child Partitions Management Partition Applications Applications Applications Applications User Mode WMI Provider VM Service Windows Server 2008 Non-Hypervisor Aware OS Windows Kernel Windows Kernel Linux Kernel Windows Server 2003, 2008/R2 Windows Client OS (eg. 7) VSP IHV Drivers Kernel Mode VMBus Linux VSC VSC Emulation VMBus VMBus Windows hypervisor Ring -1 “Designed for Windows” Server Hardware
6. Hyper-V Storage Hyper-V provides flexible storage options DAS: SCSI, SATA, eSATA, USB, Firewire SAN: iSCSI, Fibre Channel, SAS NAS is not supported High Availability/Live Migration Requires block based, shared storage Guest Clustering storage Via iSCSI only
10. Hyper-V Storage Parameters VHD max size 2040GB Physical disk size (for pass through disks) not limited by Hyper-V Virtual machines can have Up to 2 IDE controllers with 2 devices per controller (total 4 IDE devices) Up to 4 SCSI controllers with 64 devices per controller (total 256 devices) Optical devices only on IDE Boot disk has to be IDE ISO’s from a network share (Constrained delegation required)
11. ISOs on network Shares Machine account access to share Constrained delegation
16. Disk type comparison (Write)Dynamic VHD Improvements in Windows Server 2008 R2 3.8x 15x Significant performance improvements in Windows Server 2008 R2 with Dynamic VHD’s
17. Disk type comparison (Write)Fixed VHD vs. Pass Through disk in Windows Server 2008 R2 ~4% Equal Fixed VHD performance is almost identical to Pass Through disk
18. Disk type comparison (Write)Fixed VHD vs. Dynamic disks in Windows Server 2008 R2 ~6% difference ~15% difference
19. Disk type comparison (Write)Fixed VHD comparison WS08 R2 vs. WS08 1.3x Fixed VHD performance improved in Windows Server 2008 R2
20. Disk layout - results Assuming Integration Services are installed: Do I Use IDE or SCSI? One IDE channel or two? One VHD per SCSI controller? Multiple VHDs on a single SCSI controller? Chose as per your requirements, performance is identical
21. Differencing VHD’s Parent child relation Parent MUST NOT be modified If done, it will render the child VHD unsable Parent VHD does not change All changes are written to a differencing VHD
22. Differencing VHDsPerformance vs. chain length Differencing disk performance in Windows Server 2008 R2 improved as compared with Windows Server 2008
23. CDB Filtering SCSI Command Descriptor Block (CDB) By default CDB’s are filtered Some are partially filtered Some pass through unchanged Custom CDBs are always filtered This means by default SAN Management may not work from VM Hardware features may not work from VM Not recommended, check with SAN vendor if this is required Note that this is only for pass through disks CDB filtering may be required to be turned off for some SAN management applications when running inside the VM
24. How to disable CDB filtering? $HyperVGuest = "Server 2008 - SAN Manager" $VMManagementService = Get-WmiObject ` -class "Msvm_VirtualSystemManagementService" ` -namespace "rootirtualization" $Vm = Get-WmiObject -Namespace "rootirtualization" ` -Query "Select * From Msvm_ComputerSystem Where ` ElementName='$HyperVGuest'" $SettingData = Get-WmiObject -Namespace rootirtualization ` -Query "Associators of {$Vm} Where ` ResultClass=Msvm_VirtualSystemGlobalSettingData ` AssocClass=Msvm_ElementSettingData" $SettingData.AllowFullSCSICommandSet = $true $VMManagementService.ModifyVirtualSystem($Vm, ` $SettingData.PSBase.GetText(1))
26. Storage Model with Failover Clustering in Windows Server 2008 Failover Clustering implemented a “shared nothing” storage model for the last decade Each Disk is owned by a single node at any one time, and only that node can perform I/O to it Only one node accesses a LUN at a time SAN Shared Storage
27. Migration & Storage with Windows Server 2008 R2 NEW Cluster Shared Volume (CSV) CSV provides a single consistent file name space; All Windows Server 2008 R2 servers see the same storage Guest VMs can be moved without requiring any drive ownership changes No dismounting and remounting of volumes is required Enabling multiple nodes to concurrently access a single ‘truly’ shared volume From hundreds of LUN’s to a handful… Validate times from all night long, to minutes… Real browse-able paths, no more GUID’s…
28. Cluster Shared Volume Overview Concurrent access to a single file system SAN Disk5 Single Volume VHD VHD VHD
30. Storage Performance/Sizing Important to scale performance to the total workload requirements of each VM Spindles are still key Don’t migrate 20 physical servers with 40 spindles each to a Hyper-V host with 10 spindles Don’t use left over servers as a production SAN
31. Antivirus and Hyper-V Exclude VHDs & AVHDs (or directories) VM configuration directory VMMS.exe and VMWP.exe CSV directory (%systemdrive%lusterstorage) Run Antivirus in virtual machines as you would normally for a physical machine
32. Encryption and Compression Bitlocker on parent partition supported Bitlocker when operating in a cluster is not supported Encrypted File System (EFS) Not supported on parent partition Supported in Virtual Machines NTFS Compression (Parent partition) Allowed in Windows Server 2008 Blocked in Windows Server 2008 R2
33. Storage Hardware that is qualified with Windows Server is qualified for Hyper-V Applies to running devices from Hyper-V parent Storage devices qualified for Server 2008 R2 are qualified with Server 2008 R2 Hyper-V No additional storage device qualification for Hyper-V Storage Hardware & Hyper-V R2 =
34. SAN Boot and Hyper-V Booting Hyper-V Host from SAN is supported Fibre Channel or iSCSI from parent Booting child VM from SAN supported using iSCSI boot with PXE solution (ex: emBoot/Doubletake) Must use legacy NIC Native VHD boot (independent of Hyper-V) Boot physical system from local VHD is new feature in Server 2008 R2 Booting a VHD located on SAN (iSCSI or FC) not currently supported (considering for future)
35. iSCSI Direct Microsoft iSCSI Software initiator runs transparently from within the VM VM operates with full control of LUN LUN not visible to parent iSCSI initiator communicates to storage array over TCP stack Best for application transparency LUNs can be hot added & hot removed without requiring reboot of VM (2003, 2008 and 2008 R2) VSS hardware providers run transparently within the VM Backup/Recovery runs in the context of VM Enables guest clustering scenario
36. iSCSI Perf Best Practices with Hyper-V Standard Networking & iSCSI best practices apply Use Jumbo Frames (Jumbo frames supported with Hyper-V Switch and virtual NIC in Windows Server 2008 R2) Use Dedicated NIC ports for iSCSI traffic (Server to SAN) Multiple to scale Client Server (LAN) Multiple to scale Cluster heartbeat (if using cluster) Hyper-V Management Unbind unneeded services from NIC’s carrying iSCSI traffic File Sharing, DNS
37. Hyper-V Network Configurations with iSCSI Example: Server has 4 physical network adapters NIC 1: Assigned to parent partition for management NIC 2: Assigned to parent partition for iSCSI NICs 3/4: Assigned to virtual switches for virtual machine networking
38. Live Migration/HA Best Practices Best Practices: Cluster Nodes: Hardware with Windows Logo + Failover Cluster Configuration Program (FCCP) Storage: Cluster Shared Volumes Storage with Windows Logo + FCCP Multi-Path IO (MPIO) is your friend… Networking: Standardize the names of your virtual switches Multiple Interfaces CSV uses separate network Use ISOs not physical CD/DVDs You can’t Live Migrate a VM that has a physical DVD attached!
39.
40. Windows Server 2008 Performance Tuning Guide http://www.microsoft.com/whdc/system/sysperf/Perf_tun_srv.mspx
41. Many of the enterprise array vendors include sizing tools for storage on their websites
43. EMC HP CompellentNetApp Dell/EquallogicHitachi
44.
45. MCS & MPIO with Hyper-V Provides High Availability to storage arrays Especially important in virtualized environments to reduce single points of failure Load balancing & fail over using redundant HBAs, NICs, switches and fabric infrastructure Aggregates bandwidth to maximum performance MPIO supported with Fibre Channel , iSCSI, Shared SAS 2 Options for multi-pathing with iSCSI Multiple Connections per Session Microsoft MPIO (Multipathing Input/Output) Protects against loss of data path during firmware upgrades on storage controller
46. Configuring MPIO with Hyper-V MPIO Connect from parent Applies to: Creating vhds for each VM Passthrough disks Additional connections can be added through MCS with iSCSI using iSCSI direct
47. Conclusions Significant performance gains between Server 2008 and Server 2008 R2 for enterprise storage workloads Performance improvements in Hyper-V, MPIO, iSCSI, Core storage stack & Networking stack For general workloads with multiple VMs, performance delta is minimal between Pass Through & VHD iSCSI Performance especially with iSCSI direct scenarios is vastly improved
48. Related Content Required Slide Speakers, please list the Breakout Sessions, TLC Interactive Theaters and Labs that are related to your session. MGT220 Virtualisation 360: Microsoft Virtualisation Strategy, Products, and Solutions for the New Economy SVR205 Introduction to Hyper-V and Windows Server 2008 R2 with Microsoft System Center Virtual Machine Manager SVR208 Gaining Higher Availability with Windows Server 2008 R2 Failover Clustering SVR303 Planning for Windows Server 2008 R2, Virtualization and Server Consolidation with Windows Server Solution Accelerators SVR307 Security Best Practices for Hyper-V and Server Virtualisation SVR308 Storage and Hyper-V: The Choices You Can Make and the Things You Need to Know SVR318 How to Protect Your VirtualisedEnvironment SVR319 Multi-Site Clustering with Windows Server 2008 R2 SVR09-IS Windows Server 2008 R2 Hyper-V Deployment Considerations
49. Additional Resources Microsoft MPIO: http://www.microsoft.com/mpio MPIO DDK MPIO DSM sample, interfaces and libraries will be included in Windows 7 DDK/SDK Microsoft iSCSI: http://www.microsoft.com/iSCSI SCSI@microsoft.com iSCSI WMI Interfaces: http://msdn.microsoft.com/en-us/library/ms807120.aspx Storport Website: http://www.microsoft.com/Storport Storport Documentation Windows Driver Kit MSDN: http://msdn.microsoft.com/en-us/library/bb870491.aspx Microsoft Virtualization: http://www.microsoft.com/virtualization/default.mspx Hyper-V Planning & Deployment Guide http://technet.microsoft.com/en-us/library/cc794762.aspx Microsoft Virtualization Website www.microsoft.com/virtualization http://www.microsoft.com/virtualization/partners.mspx http://blogs.technet.com/virtualization http://blogs.technet.com/jhoward/default.aspx http://blogs.msdn.com/taylorb/
52. Required Slide Speakers, TechEd 2009 is not producing a DVD. Please announce that attendees can access session recordings at TechEd Online. www.microsoft.com/teched Sessions On-Demand & Community www.microsoft.com/learning Microsoft Certification & Training Resources http://microsoft.com/technet Resources for IT Professionals http://microsoft.com/msdn Resources for Developers www.microsoft.com/learning Microsoft Certification and Training Resources Resources