SlideShare a Scribd company logo
System Center 2012
Virtual Machine Manager
Norman W. Mayes, CISSP MCSE MCITP-E ITIL-F
July 2013
Identity Management | Data Protection | Authentication Strategies
© 2013 Edgile, Inc. – All Rights Reserved
Table of Contents
System Center – VMM
Introductions
Overview of VMM
VMM Database
Clustering
1
2
3
4
Next Steps5
© 2013 Edgile, Inc. – All Rights Reserved
Introductions
Business-Aligned Security
3
Edgile aligns security with the strategy, goals and demands
of the business; allowing us to redefining security in terms
of Strategic Capabilities and transform the perception of
security from a risk reduction activity into a Strategic
Imperative for the company.
Aligning Security
with the Strategy,
Goals and Demands
of the Business
© 2013 Edgile, Inc. – All Rights Reserved
Established in 2001 by Partners and Senior Managers from Deloitte
to Deliver Security Solutions to Leading Companies:
 Microsoft Security Solutions from the boardroom to the network
 Addressing the most challenging
security issues confronting
our customers
 Long-term relations drive solutions
from strategy to deployment
Edgile Exceeds Big-4 in Quality
and Style:
 Senior resources with real
world experience
 Small, focused and capable teams
 Senior technologist
Introductions
Edgile Background
4
Professionalism
MS
Expertise
VARS
Big 4
High
Low
Competitors
Junior Resources,
High % of Clients Not
Reference-able
Low High
Boutiques
© 2013 Edgile, Inc. – All Rights Reserved
Virtual Machine Manager Overview
 Brief overview of System Center 2012, SP1 – Virtual Machine Manager
(VMM)
VMM Database
 Discuss the deployment options and placement of SQL Server to
support Virtual Machine Manager and future System Center products
Clustering
 Discuss High Availability (HA), Failover and Clustering
Introductions
Session Goals
© 2013 Edgile, Inc. – All Rights Reserved
OVERVIEW
Development
Production
Configure &
Deploy
Cloud
Abstraction
Delegated
Capacity
Standardized
Services
Assign dedicated and shared resources
Windows Server 2012/2008
R2 Hyper-V,
VMware, Citrix XenServer
Intel, AMD,
OEM hardware
Fiber Channel,
iSCSI
Overview
Virtual Machine Manager 2012
© 2013 Edgile, Inc. – All Rights Reserved
Overview
Virtual Machine Manager Fabric
STORAGE
Discover, classify, and
allocate storage for use by
the private cloud. Provide the
correct storage for use with
appropriate access.
COMPUTE
Deploy your compute
resources, taking them from
bare metal to fully deployed
for your physical and
virtualization hosts.
NETWORK
Abstract your complex
networking infrastructure into
logical networks for cloud
use. Assign IP, virtual IP, and
MAC addresses from pools
and integrate with load
balancers.
CLUSTER
Consolidate your fabric
elements for use in a private
cloud.
© 2013 Edgile, Inc. – All Rights Reserved
Overview – 2012 Feature
Automated Bare-Metal Hyper-V
Bare-metal
server
WDS server
VHD
Drivers
Host profile
contoso
Library server
Hyper-V server
1
3
24
5
67
8
9
OOB reboot
Boot from PXE
Download VHDInject drivers
Authorize
PXE boot
Run generic command
execution scripts and
configure partitions Customize and
domain join
Enable Hyper-V
Download WINPE
Hyper-V server
Host Group
Hyper-V serverHyper-V server
Host Group
VMM server
Hyper-V serverHyper-V server
Host Group
SMI-S
Provider
Virtual Machine Manager
Gold Silver
Assign existing LUNs to
hosts and clusters
Create new LUNs from
pool and assign to hosts
and clusters
Allocate storage to
specific host groups
Create storage
classification pools and
associate with storage
Discover storage
through SMI-S provider
Host Group
Industry Standard API
Overview – 2012 Feature
Storage Allocation & Management
Server Virtualization
 Run multiple virtual servers
on a physical server
 Each VM has illusion it is running as a
physical server
Hyper-V Network Virtualization
 Run multiple virtual networks on a
physical network
 Each virtual network has illusion it is
running as a physical network
 Realized via Windows Server and VMM
Blue VM Red VM
Virtualization
Physical
Server
Blue Network Red Network
Physical
Network
Overview – 2012 Feature
Hyper-V Network Virtualization
© 2013 Edgile, Inc. – All Rights Reserved
Overview
VMM vs VMM SP1
System Center 2012
Virtual Machine Manager
SQL ServerWindows Server
Manages
Microsoft
Hyper-V Server 2008 R2
Windows Server 2012
Windows Server 2008 R2
Microsoft
Hyper-V Server 2012
SP1
2008 R22012 2008 R22008 R2 or 2012
© 2013 Edgile, Inc. – All Rights Reserved
Reliability and Predictability: Applications are highly available and
fault-tolerant.
Highly Automated: Infrastructure is highly automated to complete
tasks for provisioning new systems and configuring
storage, networking, and applications on its own without any manual
intervention.
Agility of Speed: Applications are deployed faster, and changes are
made much easier.
Focus of Applications and Services: Applications and
services, uptime, and quality of the service (QoS) as a measure for
success of a private cloud.
Overview
Virtual Machine Manager Benefits
© 2013 Edgile, Inc. – All Rights Reserved
VMM DATABASE
© 2013 Edgile, Inc. – All Rights Reserved
Virtual Machine Manager Database
SQL Supported Versions
SQL Server for System Center 2012 –
Virtual Machine Manager
Service Pack Editions
SQL Server 2008 R2 (64-bit) Service Pack 2 or earlier Standard, Enterprise, and Datacenter
SQL Server 2008 (64-bit) Service Pack 2 or Service Pack 3 Standard and Enterprise
SQL Server for VMM in System Center 2012 SP1 Service Pack Editions
SQL Server 2008 R2 Service Pack 1 or Service Pack 2 Standard, Enterprise, and Datacenter (64-bit)
SQL Server 2012 With or without Service Pack 1 Enterprise, Standard (64-bit)
System Center 2012 Virtual Machine Manager
System Center 2012 Virtual Machine Manager SP1
© 2013 Edgile, Inc. – All Rights Reserved
Virtual Machine Manager Database
SQL Hardware Requirements
Hardware component Minimum Recommended
Processor Pentium 4, 2.8 GHz Dual-Core 64-bit, 2 GHz
RAM 2 GB 4 GB
Hard disk space 80 GB 150 GB
Hardware component Minimum Recommended
Processor Dual-Core 64-bit, 2 GHz Dual-Core 64-bit, 2.8 GHz
RAM 4 GB 8 GB
Hard disk space 150 GB 200 GB
Managing up to 150 Hosts
Managing more than 150 Hosts
Note: Recommend a dedicated SQL Server for environments hosting more than 10 VMs
© 2013 Edgile, Inc. – All Rights Reserved
VMM encrypts some data in the VMM database (for example Run As
account credentials and passwords in guest operating system profiles)
by using the Windows Data Protection API (DPAPI). The encryption of
this data is tied to the specific computer on which VMM is installed
and the service account used by VMM. Therefore, if you need to move
your VMM installation to another computer, the encrypted data will not
be retained.
Distributed key management, however, stores the encryption keys in
AD DS. Therefore, if you need to move your VMM installation to
another computer, the encrypted data will be retained, because the
other computer will have access to the encryption keys in AD DS.
Virtual Machine Manager Database
Distributed Key Management
© 2013 Edgile, Inc. – All Rights Reserved
 The AlwaysOn feature is a high-availability and disaster-recovery
solution that provides an enterprise-level alternative to database
mirroring.
 Introduced in SQL Server 2012, AlwaysOn maximizes the availability
of a set of user databases for an enterprise. An availability
group supports a failover environment for a discrete set of user
databases, known as availability databases, that fail over together.
 An availability group fails over at the level of an availability replica.
Failovers are not caused by database issues such as a database
becoming suspect due to a loss of a data file, deletion of a
database, or corruption of a transaction log.
Note: Requires SQL Server 2012 Enterprise Edition
Virtual Machine Manager Database
SQL Server 2012 AlwaysOn
© 2013 Edgile, Inc. – All Rights Reserved
In System Center 2012 SP1, SQL Server 2012 AlwaysOn is supported in the
following components:
 App Controller
 Operations Manager
 Orchestrator
 Service Manager
 Virtual Machine Manager
AlwaysOn is not supported in the following components:
 Data Protection Manager (DPM)
 Configuration Manager
Virtual Machine Manager Database
AlwaysOn and System Center 2012
© 2013 Edgile, Inc. – All Rights Reserved
CLUSTERING
© 2013 Edgile, Inc. – All Rights Reserved
Clustering
Virtual Machine Manager - HA
© 2013 Edgile, Inc. – All Rights Reserved
NEXT STEPS
© 2013 Edgile, Inc. – All Rights Reserved
3-Day Planning Session
 Identification of systems management and/or virtualization goals and
assessment of organizational requirements
 A workshop covering Microsoft System Center 2012 Virtual Machine
Manager with an architecture design session including
recommendations.
5-Day Planning Session
 Analysis of existing infrastructure using the Microsoft Assessment and
Planning (MAP) Toolkit with an architecture design and technical drill
down sessions followed by a Proof-of-Concept.
Next Steps
Planning Design Sessions

More Related Content

What's hot

VMware vCloud Suite
VMware vCloud SuiteVMware vCloud Suite
VMware vCloud Suite
VMware
 
V sphere 5.1 what's new presentation, customer
V sphere 5.1   what's new presentation, customerV sphere 5.1   what's new presentation, customer
V sphere 5.1 what's new presentation, customer
solarisyourep
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s newsolarisyourep
 
iPlanet basics
iPlanet basicsiPlanet basics
iPlanet basics
zeroproductionincidents
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
Madhu Bala
 
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
Suministros Obras y Sistemas
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
Yogeshwaran R
 
Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6
Adam Eckerle
 
Ds v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plusDs v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plus
Chau Tuan Nguyen
 
VMware
VMwareVMware
VMware
InstituteIBA
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
VMware Virtualization 27 09 07
VMware Virtualization  27 09 07VMware Virtualization  27 09 07
VMware Virtualization 27 09 07
Oliver Barreto Rodríguez
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
1CloudRoad.com
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
Ronnie Isherwood
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats NewAmit Gatenyo
 
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer PresentationWhat’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
Suministros Obras y Sistemas
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
Barcamp Cork
 
Vsphere esxi-vcenter-server-50-installation-setup-guide
Vsphere esxi-vcenter-server-50-installation-setup-guideVsphere esxi-vcenter-server-50-installation-setup-guide
Vsphere esxi-vcenter-server-50-installation-setup-guideamirzahur
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentation
Amit Kapadia
 

What's hot (20)

VMware vCloud Suite
VMware vCloud SuiteVMware vCloud Suite
VMware vCloud Suite
 
V sphere 5.1 what's new presentation, customer
V sphere 5.1   what's new presentation, customerV sphere 5.1   what's new presentation, customer
V sphere 5.1 what's new presentation, customer
 
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best PracticesVMworld 2013: VMware vSphere High Availability - What's New and Best Practices
VMworld 2013: VMware vSphere High Availability - What's New and Best Practices
 
Presentation v cloud suite 5.1 – what’s new
Presentation   v cloud suite 5.1 – what’s newPresentation   v cloud suite 5.1 – what’s new
Presentation v cloud suite 5.1 – what’s new
 
iPlanet basics
iPlanet basicsiPlanet basics
iPlanet basics
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...VMware vSphere Storage Appliance (VSA) -  Technical Presentation,Almacenamien...
VMware vSphere Storage Appliance (VSA) - Technical Presentation,Almacenamien...
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 
Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6Nashville VMUG Keynote April 8 2015 - vSphere 6
Nashville VMUG Keynote April 8 2015 - vSphere 6
 
Ds v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plusDs v sphere-enterprise-ent-plus
Ds v sphere-enterprise-ent-plus
 
VMware
VMwareVMware
VMware
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
VMware Virtualization 27 09 07
VMware Virtualization  27 09 07VMware Virtualization  27 09 07
VMware Virtualization 27 09 07
 
VMworld2011 Recap
VMworld2011 RecapVMworld2011 Recap
VMworld2011 Recap
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
 
System Center Virtual Machine Manager 2012 - Whats New
System Center  Virtual Machine Manager 2012 - Whats NewSystem Center  Virtual Machine Manager 2012 - Whats New
System Center Virtual Machine Manager 2012 - Whats New
 
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer PresentationWhat’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
What’s new in vSphere 5 and vCenter Server Heartbeat – Customer Presentation
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Vsphere esxi-vcenter-server-50-installation-setup-guide
Vsphere esxi-vcenter-server-50-installation-setup-guideVsphere esxi-vcenter-server-50-installation-setup-guide
Vsphere esxi-vcenter-server-50-installation-setup-guide
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentation
 

Viewers also liked

System Center
System CenterSystem Center
System Center
Blauge
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Veeam Software
 
System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2aralves
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180Juan Ulacia
 
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Kesavan Munuswamy
 
Intro to Deploying and administering server virtualization with Hyper-V and S...
Intro to Deploying and administering server virtualization with Hyper-V and S...Intro to Deploying and administering server virtualization with Hyper-V and S...
Intro to Deploying and administering server virtualization with Hyper-V and S...
Unitek Eduation
 
System Center Operations Manager et la supervision des applications (.Net et ...
System Center Operations Manager et la supervision des applications (.Net et ...System Center Operations Manager et la supervision des applications (.Net et ...
System Center Operations Manager et la supervision des applications (.Net et ...
Microsoft Technet France
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...
hypervnu
 
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
Microsoft Technet France
 
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
Microsoft Technet France
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical OverviewAmit Gatenyo
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewAmit Gatenyo
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewAmit Gatenyo
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
Mark Wilson
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
Amit Gatenyo
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
ESXLab
 
Alphorm.com Support Formation SCOM 2012 R2, les fondamentaux
Alphorm.com Support Formation SCOM 2012 R2, les fondamentauxAlphorm.com Support Formation SCOM 2012 R2, les fondamentaux
Alphorm.com Support Formation SCOM 2012 R2, les fondamentaux
Alphorm
 
Alphorm.com Support de la Formation SCOM 2012 R2 avancé
Alphorm.com Support de la Formation SCOM 2012 R2 avancéAlphorm.com Support de la Formation SCOM 2012 R2 avancé
Alphorm.com Support de la Formation SCOM 2012 R2 avancé
Alphorm
 

Viewers also liked (20)

System Center
System CenterSystem Center
System Center
 
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
Microsoft System Center Data Protection Manager and Veeam Backup & Replicatio...
 
System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2System Center Virtual Machine Manager 2008 R2
System Center Virtual Machine Manager 2008 R2
 
Vsphere 4-partner-training180
Vsphere 4-partner-training180Vsphere 4-partner-training180
Vsphere 4-partner-training180
 
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
Step by Step Windows Azure pack for windows server 2012 R2 Guide v1
 
Intro to Deploying and administering server virtualization with Hyper-V and S...
Intro to Deploying and administering server virtualization with Hyper-V and S...Intro to Deploying and administering server virtualization with Hyper-V and S...
Intro to Deploying and administering server virtualization with Hyper-V and S...
 
System Center Operations Manager et la supervision des applications (.Net et ...
System Center Operations Manager et la supervision des applications (.Net et ...System Center Operations Manager et la supervision des applications (.Net et ...
System Center Operations Manager et la supervision des applications (.Net et ...
 
How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...How to bi your operations with System Center 2012 R2 using Operations Manager...
How to bi your operations with System Center 2012 R2 using Operations Manager...
 
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
System Center 2012 | SCO : Retours d’expériences projets et déploiements Syst...
 
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
Automatisez rapidement vos opérations IT, on-premise ou dans le Cloud avec Az...
 
System Center 2012 Technical Overview
System Center 2012 Technical OverviewSystem Center 2012 Technical Overview
System Center 2012 Technical Overview
 
System Center Operations Manager 2012 Overview
System Center Operations Manager 2012 OverviewSystem Center Operations Manager 2012 Overview
System Center Operations Manager 2012 Overview
 
System Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 OverviewSystem Center Configuration Manager 2012 Overview
System Center Configuration Manager 2012 Overview
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012SCOM 2012 & SCCM 2012
SCOM 2012 & SCCM 2012
 
SCCM 2012 Presentation
SCCM 2012 PresentationSCCM 2012 Presentation
SCCM 2012 Presentation
 
VMware vSphere 5.1 Overview
VMware vSphere 5.1 OverviewVMware vSphere 5.1 Overview
VMware vSphere 5.1 Overview
 
Alphorm.com Support Formation SCOM 2012 R2, les fondamentaux
Alphorm.com Support Formation SCOM 2012 R2, les fondamentauxAlphorm.com Support Formation SCOM 2012 R2, les fondamentaux
Alphorm.com Support Formation SCOM 2012 R2, les fondamentaux
 
Alphorm.com Support de la Formation SCOM 2012 R2 avancé
Alphorm.com Support de la Formation SCOM 2012 R2 avancéAlphorm.com Support de la Formation SCOM 2012 R2 avancé
Alphorm.com Support de la Formation SCOM 2012 R2 avancé
 
Just Words day 9
Just Words day 9Just Words day 9
Just Words day 9
 

Similar to System Center 2012 Virtual Machine Manager

Ahmed magdy CV
Ahmed magdy CVAhmed magdy CV
Ahmed magdy CV
Ahmed Magdy
 
What's new in smart cloud enterprise 2.2
What's new in smart cloud enterprise 2.2What's new in smart cloud enterprise 2.2
What's new in smart cloud enterprise 2.2
Innocenti Andrea
 
Présentation IBM SmartCloud Entry 3.1
Présentation IBM SmartCloud Entry 3.1Présentation IBM SmartCloud Entry 3.1
Présentation IBM SmartCloud Entry 3.1
Claude Riousset
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanDavid J Rosenthal
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
Motty Ben Atia
 
kalaimathi_resume
kalaimathi_resumekalaimathi_resume
kalaimathi_resumeKalai Mathi
 
C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times fasterDr. Wilfred Lin (Ph.D.)
 
Session #107 - AMSI Hosting Options
Session #107 - AMSI Hosting OptionsSession #107 - AMSI Hosting Options
Session #107 - AMSI Hosting Optionswebhostingguy
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
Cenk Ersoy
 
updated CV for Windows -2016
updated CV for Windows -2016updated CV for Windows -2016
updated CV for Windows -2016Mahender Boini
 
Microsoft private cloud
Microsoft private cloudMicrosoft private cloud
Microsoft private cloudebuc
 
IBM Private Modular Cloud
IBM Private Modular CloudIBM Private Modular Cloud
IBM Private Modular Cloud
Herb Hernandez
 
IBM SmartCloud Entry
IBM SmartCloud EntryIBM SmartCloud Entry
IBM SmartCloud Entry
IBM India Smarter Computing
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
Norman Mayes
 
Oracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewOracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewFred Sim
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overviewwebhostingguy
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
Scientia Groups
 
Mt14 building your cloud
Mt14 building your cloudMt14 building your cloud
Mt14 building your cloud
Dell World
 
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013IBM Switzerland
 

Similar to System Center 2012 Virtual Machine Manager (20)

Ahmed magdy CV
Ahmed magdy CVAhmed magdy CV
Ahmed magdy CV
 
What's new in smart cloud enterprise 2.2
What's new in smart cloud enterprise 2.2What's new in smart cloud enterprise 2.2
What's new in smart cloud enterprise 2.2
 
Présentation IBM SmartCloud Entry 3.1
Présentation IBM SmartCloud Entry 3.1Présentation IBM SmartCloud Entry 3.1
Présentation IBM SmartCloud Entry 3.1
 
Microsoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by AtidanMicrosoft System Center 2012 R2 Overview - Presented by Atidan
Microsoft System Center 2012 R2 Overview - Presented by Atidan
 
Avaya Network Management Overview
Avaya Network Management OverviewAvaya Network Management Overview
Avaya Network Management Overview
 
kalaimathi_resume
kalaimathi_resumekalaimathi_resume
kalaimathi_resume
 
C6 deploying applications to your private cloud 7 to 10 times faster
C6   deploying applications to your private cloud 7 to 10 times fasterC6   deploying applications to your private cloud 7 to 10 times faster
C6 deploying applications to your private cloud 7 to 10 times faster
 
Session #107 - AMSI Hosting Options
Session #107 - AMSI Hosting OptionsSession #107 - AMSI Hosting Options
Session #107 - AMSI Hosting Options
 
Transforming Mission Critical Applications
Transforming Mission Critical ApplicationsTransforming Mission Critical Applications
Transforming Mission Critical Applications
 
updated CV for Windows -2016
updated CV for Windows -2016updated CV for Windows -2016
updated CV for Windows -2016
 
Microsoft private cloud
Microsoft private cloudMicrosoft private cloud
Microsoft private cloud
 
IBM Private Modular Cloud
IBM Private Modular CloudIBM Private Modular Cloud
IBM Private Modular Cloud
 
IBM SmartCloud Entry
IBM SmartCloud EntryIBM SmartCloud Entry
IBM SmartCloud Entry
 
System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2System Center Endpoint Protection 2012 R2
System Center Endpoint Protection 2012 R2
 
Oracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c OverviewOracle - Enterprise Manager 12c Overview
Oracle - Enterprise Manager 12c Overview
 
Microsoft Virtualization Overview
Microsoft Virtualization OverviewMicrosoft Virtualization Overview
Microsoft Virtualization Overview
 
System Center Endpoint Protection
System Center Endpoint ProtectionSystem Center Endpoint Protection
System Center Endpoint Protection
 
Mt14 building your cloud
Mt14 building your cloudMt14 building your cloud
Mt14 building your cloud
 
Malek Khalifa CV
Malek Khalifa CVMalek Khalifa CV
Malek Khalifa CV
 
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
Integrierte Experten Systeme_Erik-Werner Radtke_IBM Symposium 2013
 

More from Norman Mayes

Nozzle: A Defense Against Heap-Spraying
Nozzle:  A Defense Against Heap-SprayingNozzle:  A Defense Against Heap-Spraying
Nozzle: A Defense Against Heap-SprayingNorman Mayes
 
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
NOZZLE: A Defense Against Heap-spraying Code Injection AttacksNOZZLE: A Defense Against Heap-spraying Code Injection Attacks
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
Norman Mayes
 
System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRC
Norman Mayes
 
2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary
Norman Mayes
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiNorman Mayes
 

More from Norman Mayes (6)

Nozzle: A Defense Against Heap-Spraying
Nozzle:  A Defense Against Heap-SprayingNozzle:  A Defense Against Heap-Spraying
Nozzle: A Defense Against Heap-Spraying
 
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
NOZZLE: A Defense Against Heap-spraying Code Injection AttacksNOZZLE: A Defense Against Heap-spraying Code Injection Attacks
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
 
System Center 2012 - IT GRC
System Center 2012 - IT GRCSystem Center 2012 - IT GRC
System Center 2012 - IT GRC
 
2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary2013 State of the CIO Exec Summary
2013 State of the CIO Exec Summary
 
Delivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefiDelivering a secure and fast boot experience with uefi
Delivering a secure and fast boot experience with uefi
 
Goldman
GoldmanGoldman
Goldman
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 

System Center 2012 Virtual Machine Manager

  • 1. System Center 2012 Virtual Machine Manager Norman W. Mayes, CISSP MCSE MCITP-E ITIL-F July 2013 Identity Management | Data Protection | Authentication Strategies © 2013 Edgile, Inc. – All Rights Reserved
  • 2. Table of Contents System Center – VMM Introductions Overview of VMM VMM Database Clustering 1 2 3 4 Next Steps5
  • 3. © 2013 Edgile, Inc. – All Rights Reserved Introductions Business-Aligned Security 3 Edgile aligns security with the strategy, goals and demands of the business; allowing us to redefining security in terms of Strategic Capabilities and transform the perception of security from a risk reduction activity into a Strategic Imperative for the company. Aligning Security with the Strategy, Goals and Demands of the Business
  • 4. © 2013 Edgile, Inc. – All Rights Reserved Established in 2001 by Partners and Senior Managers from Deloitte to Deliver Security Solutions to Leading Companies:  Microsoft Security Solutions from the boardroom to the network  Addressing the most challenging security issues confronting our customers  Long-term relations drive solutions from strategy to deployment Edgile Exceeds Big-4 in Quality and Style:  Senior resources with real world experience  Small, focused and capable teams  Senior technologist Introductions Edgile Background 4 Professionalism MS Expertise VARS Big 4 High Low Competitors Junior Resources, High % of Clients Not Reference-able Low High Boutiques
  • 5. © 2013 Edgile, Inc. – All Rights Reserved Virtual Machine Manager Overview  Brief overview of System Center 2012, SP1 – Virtual Machine Manager (VMM) VMM Database  Discuss the deployment options and placement of SQL Server to support Virtual Machine Manager and future System Center products Clustering  Discuss High Availability (HA), Failover and Clustering Introductions Session Goals
  • 6. © 2013 Edgile, Inc. – All Rights Reserved OVERVIEW
  • 7. Development Production Configure & Deploy Cloud Abstraction Delegated Capacity Standardized Services Assign dedicated and shared resources Windows Server 2012/2008 R2 Hyper-V, VMware, Citrix XenServer Intel, AMD, OEM hardware Fiber Channel, iSCSI Overview Virtual Machine Manager 2012
  • 8. © 2013 Edgile, Inc. – All Rights Reserved Overview Virtual Machine Manager Fabric STORAGE Discover, classify, and allocate storage for use by the private cloud. Provide the correct storage for use with appropriate access. COMPUTE Deploy your compute resources, taking them from bare metal to fully deployed for your physical and virtualization hosts. NETWORK Abstract your complex networking infrastructure into logical networks for cloud use. Assign IP, virtual IP, and MAC addresses from pools and integrate with load balancers. CLUSTER Consolidate your fabric elements for use in a private cloud.
  • 9. © 2013 Edgile, Inc. – All Rights Reserved Overview – 2012 Feature Automated Bare-Metal Hyper-V Bare-metal server WDS server VHD Drivers Host profile contoso Library server Hyper-V server 1 3 24 5 67 8 9 OOB reboot Boot from PXE Download VHDInject drivers Authorize PXE boot Run generic command execution scripts and configure partitions Customize and domain join Enable Hyper-V Download WINPE Hyper-V server Host Group Hyper-V serverHyper-V server Host Group VMM server Hyper-V serverHyper-V server Host Group
  • 10. SMI-S Provider Virtual Machine Manager Gold Silver Assign existing LUNs to hosts and clusters Create new LUNs from pool and assign to hosts and clusters Allocate storage to specific host groups Create storage classification pools and associate with storage Discover storage through SMI-S provider Host Group Industry Standard API Overview – 2012 Feature Storage Allocation & Management
  • 11. Server Virtualization  Run multiple virtual servers on a physical server  Each VM has illusion it is running as a physical server Hyper-V Network Virtualization  Run multiple virtual networks on a physical network  Each virtual network has illusion it is running as a physical network  Realized via Windows Server and VMM Blue VM Red VM Virtualization Physical Server Blue Network Red Network Physical Network Overview – 2012 Feature Hyper-V Network Virtualization
  • 12. © 2013 Edgile, Inc. – All Rights Reserved Overview VMM vs VMM SP1 System Center 2012 Virtual Machine Manager SQL ServerWindows Server Manages Microsoft Hyper-V Server 2008 R2 Windows Server 2012 Windows Server 2008 R2 Microsoft Hyper-V Server 2012 SP1 2008 R22012 2008 R22008 R2 or 2012
  • 13. © 2013 Edgile, Inc. – All Rights Reserved Reliability and Predictability: Applications are highly available and fault-tolerant. Highly Automated: Infrastructure is highly automated to complete tasks for provisioning new systems and configuring storage, networking, and applications on its own without any manual intervention. Agility of Speed: Applications are deployed faster, and changes are made much easier. Focus of Applications and Services: Applications and services, uptime, and quality of the service (QoS) as a measure for success of a private cloud. Overview Virtual Machine Manager Benefits
  • 14. © 2013 Edgile, Inc. – All Rights Reserved VMM DATABASE
  • 15. © 2013 Edgile, Inc. – All Rights Reserved Virtual Machine Manager Database SQL Supported Versions SQL Server for System Center 2012 – Virtual Machine Manager Service Pack Editions SQL Server 2008 R2 (64-bit) Service Pack 2 or earlier Standard, Enterprise, and Datacenter SQL Server 2008 (64-bit) Service Pack 2 or Service Pack 3 Standard and Enterprise SQL Server for VMM in System Center 2012 SP1 Service Pack Editions SQL Server 2008 R2 Service Pack 1 or Service Pack 2 Standard, Enterprise, and Datacenter (64-bit) SQL Server 2012 With or without Service Pack 1 Enterprise, Standard (64-bit) System Center 2012 Virtual Machine Manager System Center 2012 Virtual Machine Manager SP1
  • 16. © 2013 Edgile, Inc. – All Rights Reserved Virtual Machine Manager Database SQL Hardware Requirements Hardware component Minimum Recommended Processor Pentium 4, 2.8 GHz Dual-Core 64-bit, 2 GHz RAM 2 GB 4 GB Hard disk space 80 GB 150 GB Hardware component Minimum Recommended Processor Dual-Core 64-bit, 2 GHz Dual-Core 64-bit, 2.8 GHz RAM 4 GB 8 GB Hard disk space 150 GB 200 GB Managing up to 150 Hosts Managing more than 150 Hosts Note: Recommend a dedicated SQL Server for environments hosting more than 10 VMs
  • 17. © 2013 Edgile, Inc. – All Rights Reserved VMM encrypts some data in the VMM database (for example Run As account credentials and passwords in guest operating system profiles) by using the Windows Data Protection API (DPAPI). The encryption of this data is tied to the specific computer on which VMM is installed and the service account used by VMM. Therefore, if you need to move your VMM installation to another computer, the encrypted data will not be retained. Distributed key management, however, stores the encryption keys in AD DS. Therefore, if you need to move your VMM installation to another computer, the encrypted data will be retained, because the other computer will have access to the encryption keys in AD DS. Virtual Machine Manager Database Distributed Key Management
  • 18. © 2013 Edgile, Inc. – All Rights Reserved  The AlwaysOn feature is a high-availability and disaster-recovery solution that provides an enterprise-level alternative to database mirroring.  Introduced in SQL Server 2012, AlwaysOn maximizes the availability of a set of user databases for an enterprise. An availability group supports a failover environment for a discrete set of user databases, known as availability databases, that fail over together.  An availability group fails over at the level of an availability replica. Failovers are not caused by database issues such as a database becoming suspect due to a loss of a data file, deletion of a database, or corruption of a transaction log. Note: Requires SQL Server 2012 Enterprise Edition Virtual Machine Manager Database SQL Server 2012 AlwaysOn
  • 19. © 2013 Edgile, Inc. – All Rights Reserved In System Center 2012 SP1, SQL Server 2012 AlwaysOn is supported in the following components:  App Controller  Operations Manager  Orchestrator  Service Manager  Virtual Machine Manager AlwaysOn is not supported in the following components:  Data Protection Manager (DPM)  Configuration Manager Virtual Machine Manager Database AlwaysOn and System Center 2012
  • 20. © 2013 Edgile, Inc. – All Rights Reserved CLUSTERING
  • 21. © 2013 Edgile, Inc. – All Rights Reserved Clustering Virtual Machine Manager - HA
  • 22. © 2013 Edgile, Inc. – All Rights Reserved NEXT STEPS
  • 23. © 2013 Edgile, Inc. – All Rights Reserved 3-Day Planning Session  Identification of systems management and/or virtualization goals and assessment of organizational requirements  A workshop covering Microsoft System Center 2012 Virtual Machine Manager with an architecture design session including recommendations. 5-Day Planning Session  Analysis of existing infrastructure using the Microsoft Assessment and Planning (MAP) Toolkit with an architecture design and technical drill down sessions followed by a Proof-of-Concept. Next Steps Planning Design Sessions