Windows Server 2008 Hyper-V Unleashed

( 2 )

Overview

Using the Hyper-V virtualization capabilities built into Windows Server 2008, organizations can slash costs for power, space, and maintenance, and dramatically improve IT flexibility at the same time. This is the first book to offer comprehensive, independent, real-world coverage of planning, designing, implementing, and supporting Windows Server 2008 Hyper-V virtualization environments. Authored by Rand Morimoto and Jeff Guillet—top consultants of Microsoft technologies with unsurpassed experience deploying ...

See more details below
Other sellers (Paperback)
  • All (10) from $6.39   
  • New (6) from $27.62   
  • Used (4) from $6.39   
Windows Server 2008 Hyper-V Unleashed

Available on NOOK devices and apps  
  • NOOK Devices
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK Study

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

Using the Hyper-V virtualization capabilities built into Windows Server 2008, organizations can slash costs for power, space, and maintenance, and dramatically improve IT flexibility at the same time. This is the first book to offer comprehensive, independent, real-world coverage of planning, designing, implementing, and supporting Windows Server 2008 Hyper-V virtualization environments. Authored by Rand Morimoto and Jeff Guillet—top consultants of Microsoft technologies with unsurpassed experience deploying Hyper-V in enterprise organizations—this book delivers start-to-finish guidance for every facet of your virtualization initiative.

Leverage the experience from hundreds of real world implementations of Hyper-V and Virtual Machine Manager 2008 in your deployment of a virtualized server environment

  • Implement best practices for planning, prototyping, and deploying Hyper-V—including strategies, processes, and templates
  • Install and configure Windows 2008 Server with Windows Hyper-V Services
  • Provide guest operating systems ranging from Windows 2003 Server to Linux
  • Administer Hyper-V Host Servers as standalone hosts or in multiple host environments
  • Optimize Hyper-V Host Server and guest sessions, by efficiently allocating memory, processors,
  • disk space, and other resources
  • Move from basic server virtualization to a systematically managed virtual enterprise environment
  • Use Virtual Machine Manager 2008 to centrally monitor all your Hyper-V hosts and guest sessions
  • Quickly provision new guest images wherever and whenever you need them
  • Implement reliable failover processes to overcome failures inguest sessions, host systems, or sites
  • Troubleshoot problems with both Hyper-V hosts and guest operating systems
Read More Show Less

Product Details

  • ISBN-13: 9780672330285
  • Publisher: Sams
  • Publication date: 8/27/2008
  • Series: Unleashed Series
  • Pages: 460
  • Sales rank: 924,879
  • Product dimensions: 7.00 (w) x 9.00 (h) x 1.20 (d)

Meet the Author

Rand Morimoto, Ph.D., MCSE, CISSP, has been in the computer industry for more than 30 years and has authored, co-authored, or been a contributing writer for dozens of bestselling books on Windows 2008, Exchange 2007, Security, BizTalk Server, and remote and mobile computing. Rand is the president of Convergent Computing, an IT consulting firm in the San Francisco Bay Area that was one of the key early adopter program partners with Microsoft implementing beta versions of Windows Server 2008 in production environments over 3 years before the product release. Rand has spoken at more than 50 conferences and conventions around the world in the past year on tips, tricks, and best practices on planning, migrating, and implementing Windows 2008 Hyper-V and System Center Virtual Machine Manager 2008.

Jeff Guillet, MCITP, MCSE, CISSP, has been in the computer industry for more than 25 years and has been a contributing writer and technical editor for several books on Windows Server 2008, Windows Server 2003, Exchange 2007, and Exchange 2003. Jeff is a senior consultant for Convergent Computing and participates in many early adopter beta programs. Jeff holds Charter MCITP: Enterprise Administrator and MCITP: Enterprise Messaging Administrator certifications for Windows Server 2008 and has maintained MCSE certifications since 1999. He maintains a popular technical blog at www.expta.com.

Read More Show Less

Table of Contents

In>

Part I Windows 2008 Hyper-V Overview

1 Windows Server 2008 Hyper-V Technology Primer 7

What Is Server Virtualization and Microsoft Hyper-V?. . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Virtualization as an IT Organization Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Microsoft Hyper-V Server as a Role in Windows Server 2008. . . . . . . . . . . . 8

Choosing to Virtualize Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Virtualization for Test and Development Environments . . . . . . . . . . . . . . . . 11

Virtualization for Server Consolidation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

Virtualization as a Strategy for Disaster Recovery and High

Availability. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Understanding Microsoft’s Virtualization Strategy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Acquisition of Virtual PC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Microsoft Virtual Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Virtual Server 2005 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Virtual Server 2005 R2. . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

Integration of Hypervisor Technology in Windows Server 2008. . . . . . 15

What’s New in Hyper-V. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

New Features That Provide Better Virtual Host Capabilities. . . . . . . . . . . . 16

New Features That Provide Better Administration Support. . . . . . . . . . . . . 16

New Features That Provide Better Guest Support. . . . . . . . . . . . . . . . . . . . . . . . . . 17

New Features That Provide Better Reliability Capabilities. . . . . . . . . . . . . . . 18

Determining What Is Needed to Virtualize Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Versions of Windows Server 2008 That Host Hyper-V . . . . . . . . . . . . . . . . . . . 19

Versions of Guest Sessions Supported Under Hyper-V . . . . . . . . . . . . . . . . . . . 23

Guest Session Integration Support Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

The Right Time to Implement Hyper-V. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Adding a Hyper-V Host Server in an Existing Active Directory

2000/2003 Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

Waiting to Fully Implement Windows 2008 in the Environment. . . . 29

Migrating from Microsoft Virtual Server 2005 and VMware . . . . . . . . . . . . . . . . . . . 29

Mounting Existing Virtual Guest Images on Hyper-V. . . . . . . . . . . . . . . . . . . . 29

Performing a Virtual to Virtual Migration of Guest Images . . . . . . . . . . . . 30

Using VMM to Manage VMware Virtual Infrastructure 3 . . . . . . . . . . . . . . . 30

Understanding the Administration of Virtual Guest Sessions . . . . . . . . . . . . . . . . . 31

Management Using the Hyper-V Administration Tool. . . . . . . . . . . . . . . . . . . 31

Management Using the Virtual Machine Manager 2008 Tool . . . . . . . . . 32

Management Using Thin Client Terminal Services . . . . . . . . . . . . . . . . . . . . . . . 32

Ensuring High Availability of a Hyper-V Host Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

No Single Point of Failure in Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Stretched Clusters for Hyper-V Hosts and Guests Across Sites . . . . . . . . . 36

Leveraging Storage Area Networks for Virtual Hosts and Guests. . . . . . 36

Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

2 Best Practices at Planning, Prototyping, Migrating, and Deploying

Windows Server 2008 Hyper-V 39

Determining the Scope of Your Project . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Identifying the Business Goals and Objectives to Implement Hyper-V

Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

High-Level Business Goals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Business Unit or Departmental Goals. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Identifying the Technical Goals and Objectives to Implement Hyper-V . . . 43

Defining the Scope of the Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Determining the Time Frame for Implementation or Migration. . . . . . 45

Defining the Participants of the Design and Deployment Teams. . . . . 47

The Discovery Phase: Understanding the Existing Environment. . . . . . . . . . . . . 49

Understanding the Geographical Depth and Breadth. . . . . . . . . . . . . . . . . . . . 50

Managing Information Overload. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Assessing Applications for Resource Requirements. . . . . . . . . . . . . . . . . . . . . . . . 52

The Design Phase: Documenting the Vision and the Plan . . . . . . . . . . . . . . . . . . . . . 53

Collaboration Sessions: Making the Design Decisions . . . . . . . . . . . . . . . . . . . 53

Organizing Information for a Structured Design Document . . . . . . . . . . . 54

Windows Server 2008 Hyper-V Design Decisions . . . . . . . . . . . . . . . . . . . . . . . . . 56

Agreeing on the Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

The Migration Planning Phase: Documenting the Process for

Migration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Time for the Project Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Speed Versus Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Creating the Migration Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

The Prototype Phase: Creating and Testing the Plan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

How Do You Build the Lab? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Results of the Lab Testing Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

The Pilot Phase: Validating the Plan on an Initial Set of Servers . . . . . . . . . . . . . 65

The First Server in the Pilot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Rolling Out the Pilot Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Fixing Problems in the Pilot Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Documenting the Results of the Pilot. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

The Migration/Implementation Phase: Conducting the Migration or

Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Verifying End-User Satisfaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Supporting the New Virtualized Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

The Discovery Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

The Design Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

The Migration Planning Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

The Prototype Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

The Pilot Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

The Migration/Implementation Phase. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

3 Planning, Sizing, and Architecting a Hyper-V Environment 73

Logically Distributing Virtual Servers on Specific Host Systems . . . . . . . . . . . . . . 73

Distributing Virtual Servers Based on Workload . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Distributing Virtual Servers Based on Redundancy . . . . . . . . . . . . . . . . . . . . . . . 75

Distributing Virtual Servers Based on Server Interrelationships . . . . . . . 76

Distributing Virtual Servers Based on User Connectivity . . . . . . . . . . . . . . . 76

Distributing Virtual Servers Across a WAN Connection . . . . . . . . . . . . . . . . . 77

Choosing Servers to Virtualize. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Prioritizing Servers to Virtualize . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Candidates for Immediate Virtualization to Guest Sessions. . . . . . . . . . . . 78

Secondary Candidates for Virtualization to Guest Sessions . . . . . . . . . . . . 79

Servers That Need to Be Evaluated for Candidacy for

Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Capturing the Workload Demands of Existing Servers . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Introducing the Microsoft Virtualization Solution Accelerator. . . . . . . . 82

Prerequisites for Installing the Microsoft VSA Tool . . . . . . . . . . . . . . . . . . . . . . . 82

Installing the Microsoft VSA Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Setting Up the Microsoft VSA Tool to Capture Data for the

First Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Choosing the Right Time Sequence to Capture Data. . . . . . . . . . . . . . . . . . . . . 88

Preparing a Server Consolidation Recommendation Report . . . . . . . . . . . 89

Analyzing the Workload Demands of Existing Servers . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Identify Servers That Are and Are Not Virtualization Candidates . . . . 92

Combining Virtual Server Workloads to Create Optimized

Host Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Choosing the Hyper-V Host System Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Hyper-V on a Dedicated Host Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Hyper-V on a Blade Among Other Physical Servers. . . . . . . . . . . . . . . . . . . . . . . 93

Sizing a Hyper-V Host System Without Existing Guest Data . . . . . . . . . . . . . . . . . . 93

Sizing Your Windows Server 2008 Server to Support

Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Running Other Services on the Hyper-V System . . . . . . . . . . . . . . . . . . . . . . . . . . 95

Planning for the Use of Snapshots on the Hyper-V System . . . . . . . . . . . . 95

Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Best Practices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Part II Windows 2008 Hyper-V Host and Guest Installation

4 Installing Windows 2008 Server and the Hyper-V Role 101

Planning and Preparing a Server Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

Verifying Minimum Hardware Requirements. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Choosing the Appropriate Windows Edition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Choosing a New Installation or an Upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

Full Version of Windows or Server Core Installation . . . . . . . . . . . . . . . . . . . 103

Member Server or Standalone Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Gathering the Information Necessary to Proceed. . . . . . . . . . . . . . . . . . . . . . . . 104

Backing Up Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Installing a Clean Version of Windows Server 2008 Operating System . . . 107

1. Customizing the Language, Time, Currency, and Keyboard

Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

2. The Install Now Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

3. Entering the Product Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

4. Selecting the Type of Operating System to Install . . . . . . . . . . . . . . . . . . . 108

5. Accepting the Terms of the Windows Server 2008 License . . . . . . . . 109

6. Selecting the Type of Windows Server 2008 Installation. . . . . . . . . . . 109

7. Selecting the Location for the Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

8. Finalizing the Installation and Customizing the

Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Installing the Hyper-V Server Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Running Server Manager to Add the Hyper-V Role . . . . . . . . . . . . . . . . . . . . . 116

Understanding Server Core Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

Performing a Server Core Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

Performing Common Server Tasks with Server Core . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Launching the Command Prompt in a Server Core Installation . . . . 121

Changing the Server Core Administrator’s Password . . . . . . . . . . . . . . . . . . . 121

Changing the Server Core Machine Name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121

Assigning a Static IPV4 IP Address and DNS Settings. . . . . . . . . . . . . . . . . . . 121

Adding the Server Core System to a Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Enabling Remote Management and Remote Desktop to

Server Core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

Rebooting and Shutting Down a Server Core System . . . . . . . . . . . . . . . . . . 123

Installing Hyper-V Server Role on a Server Core System. . . . . . . . . . . . . . . 123

Server Core Roles and Feature Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

5 Installing a Guest Session on Hyper-V 129

Choosing the Guest Session Operating System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

Installing a Windows-Based Guest Operating System Session . . . . . . . . . . . . . . . 130

Gathering the Components Needed for a Windows-Based Guest

Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130

Beginning the Installation of the Windows-Based Guest Session . . . 131

Completing the Installation of the Windows-Based Guest

Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

Installing a Linux-Based Guest Operating System Session . . . . . . . . . . . . . . . . . . . . 135

Gathering the Components Needed for a Linux-Based Guest

Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

Beginning the Installation of the Linux-Based Guest Session . . . . . . . . 136

Completing the Installation of the Linux-Based Guest

Session (x86). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Completing the Installation of the Linux-Based Guest

Session (x64). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Modifying Guest Session Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

Adding or Limiting the RAM of the Guest Session . . . . . . . . . . . . . . . . . . . . . . 139

Changing Network Settings for the Guest Session. . . . . . . . . . . . . . . . . . . . . . . 140

Mounting a Physical CD/DVD Image or Mounting a CD/DVD

Image File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140

Other Settings to Modify for a Guest Session Configuration . . . . . . . . . 141

Launching a Hyper-V Guest Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

Automatically Launching a Guest Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

Manually Launching a Guest Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

Save State of a Guest Session. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

Installing the Windows Guest Session Integration Tools. . . . . . . . . . . . . . . . . . . . . . 143

Installing the Windows Integration Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Using Snapshots of Guest Operating System Sessions. . . . . . . . . . . . . . . . . . . . . . . . . . 145

Snapshots for Image Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145

Snapshots for Guest Session Server Fault Tolerance . . . . . . . . . . . . . . . . . . . . . 145

Creating a Snapshot of a Guest Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Rolling Back a Guest Image to a Previous Snapshot Image . . . . . . . . . . . 146

Reverting a Snapshot Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Part III Administering and Maintaining Hyper-V Host Services

6 Managing, Administering, and Maintaining a Hyper-V Host Server 151

Becoming Familiar with the Hyper-V Administration Console. . . . . . . . . . . . . . 152

Launching the Hyper-V Administration Console. . . . . . . . . . . . . . . . . . . . . . . . 152

Using the Server Manager Tool to Manage Hyper-V Systems . . . . . . . . 152

Using the Hyper-V MMC Tool to Manage Hyper-V Systems . . . . . . . . . 153

Connecting to a Different Virtual Server System . . . . . . . . . . . . . . . . . . . . . . . . 154

Managing Windows Server 2008 Remotely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Remote Server Administration Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155

Remote Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159

Windows Remote Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162

Managing Host Server, Virtual Switch, and Disk Settings . . . . . . . . . . . . . . . . . . . . . 163

Configuring Host Server Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

Stopping the Hyper-V Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

Managing Virtual Network Segments with the Virtual Switch. . . . . . . 165

Modifying Disk Settings and Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Inspect Disk. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Using Common Practices for Securing and Managing a Hyper-V

Host Server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Identifying Security Risks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

Using System Center Operations Manager 2007 to Simplify

Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169

Leveraging Windows Server 2008 Maintenance Practices . . . . . . . . . . . . . 170

Specific Security Practices for Hyper-V Host Servers . . . . . . . . . . . . . . . . . . . . 170

Keeping Up with Service Packs and Updates. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Manual Update or CD-ROM Update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Windows Server Update Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

Offline Virtual Machine Servicing Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

Backing Up the Hyper-V Host and Guests. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

Installing Windows Server Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Scheduling a Backup Using Windows Server Backup and

Allocating Disks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

Running a Manual Backup to a Remote Server Share . . . . . . . . . . . . . . . . . . 184

Managing Backups Using the Command-Line Utility Wbadmin.exe. . . . . . 186

Viewing Backup History. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Running a Manual Backup to Remote Storage Using

Wbadmin.exe. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

Maintaining Windows Server 2008 Hyper-V Systems . . . . . . . . . . . . . . . . . . . . . . . . . . 187

Daily Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187

Weekly Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Monthly Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Quarterly Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Performing Management Tasks with Server Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 193

Server Manager Roles Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194

Server Manager Diagnostics Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

Server Manager Configuration Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

7 Optimizing the Hyper-V Host Server and Guest Sessions 209

Defining Capacity Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

The Benefits of Capacity Analysis and Performance

Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Establishing Policy and Metric Baselines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

Benchmark Baselines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212

Using Capacity-Analysis Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

Task Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

Network Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216

Windows Reliability and Performance Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . 223

Other Microsoft Assessment and Planning Tools . . . . . . . . . . . . . . . . . . . . . . . . 227

Third-Party Toolset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

Optimizing the Performance of Hyper-V Host Servers and Guest

Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

Resource Allocation to Hyper-V Guest Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . 234

Optimizing Disk Configuration for Hyper-V Guest Sessions . . . . . . . . . 236

Monitoring System Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

Key Elements to Monitor for Bottlenecks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239

Monitoring System Memory and Pagefile Usage. . . . . . . . . . . . . . . . . . . . . . . . . 239

Analyzing Processor Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

Evaluating the Disk Subsystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Monitoring the Network Subsystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

Optimizing Performance by Server Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

Virtual Servers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

Part IV System Center Virtual Machine Manager 2008 in a Hyper-V Environment

8 System Center Virtual Machine Manager Technology Primer 253

What Is Virtual Machine Manager? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

History of Virtualization and Virtualization Management. . . . . . . . . . . . . . . . . . . . 253

Microsoft History of Virtualization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Microsoft’s History on Virtualization Management . . . . . . . . . . . . . . . . . . . . . 254

What Is Virtual Machine Manager 2008? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

Components of VMM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255

VMM on Top of PowerShell. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256

PowerShell Support in VMM 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

Consoles in VMM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257

VMM Self-Service Portal. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

VMM Administrative Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

Administrative Console in VMM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258

The Navigation Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

Administrator Console Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Heterogeneous VM Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

VMs Managed by VMM 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261

Backward Compatibility and Enhancements in VMM 2008. . . . . . . . . . 262

Cluster Support in VMM 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

The Importance of Clusters in the Virtual Environment . . . . . . . . . . . . . . 263

High Availability with Clustered Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

The VMM Library. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

Hardware Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

Guest OS Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

Disk Images and ISO Image Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264

VM Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

Roles-Based Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

User Roles in VMM 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

The Value VMM 2008 Brings to the Enterprise . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

Centralized Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266

Decreases Server Sprawl . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Integration with System Center Operations Manager 2007 . . . . . . . . . . 267

Profiles and Templates Make Provisioning Easier . . . . . . . . . . . . . . . . . . . . . . . . 267

Self-Service Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Disaster Recovery and Business Continuity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267

Optimized Resource Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

Physical and Virtual Server Conversions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 268

Roles-Based Access Control. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

Who Needs VMM 2008?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

VMM 2008 for Delegated Administration Environments . . . . . . . . . . . . . 269

VMM 2008 for Structure ITIL-Based Organizations . . . . . . . . . . . . . . . . . . . . . 269

VMM 2008 for Disaster Recovery and Business Continuity . . . . . . . . . . 269

VMM 2008 for Dynamically Adjusting Environments . . . . . . . . . . . . . . . . . 269

VMM 2008 for Highly Leveraged Virtual Environments . . . . . . . . . . . . . . 270

VMM 2008 for VM Conversion Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

VMM 2008 for Heterogeneous Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

9 Installing and Getting Familiar with Virtual Machine Manager 2008 273

Understanding the Components of VMM 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

The VMM 2008 Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

The Administrator Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

The Self-Service Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

The Local Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Preparing the Server for VMM 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Single- or Multiple-Server Deployments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Supported Operating Systems for VMM Components . . . . . . . . . . . . . . . . . 276

Prerequisite Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

VMM Database Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278

VMM 2008 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Installing VMM Server and the SQL Server Express Database on

Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Installing the VMM Administrator Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

Installing the Self-Service Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

Installation of the Local Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288

Understanding the VMM Administrator Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Overview of the Administrator Console. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299

10 Creating Guest Images from Existing Production and Virtual Systems 301

Understanding Virtual Machine Conversions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Physical Computers That Can Be Converted. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Additional Requirements for P2V Conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

Performing a P2V Conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

Performing a P2V Online Conversion. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303

Performing a V2V Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Performing a V2V Conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

Creating a Virtual Lab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317

Using P2V to Create a Virtual Copy of Production. . . . . . . . . . . . . . . . . . . . . . 317

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318

11 Using Virtual Machine Manager 2008 for Provisioning 321

Understanding Roles-Based Access and Delegation to Provision

Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Administrator Role in VMM 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Delegated Administrator Within VMM 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Self-Service User as a Role in VMM 2008. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Managing User Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Managing the Administrator User Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Creating a Delegated Administrator User Role . . . . . . . . . . . . . . . . . . . . . . . . . . . 324

Creating a Self-Service User Role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

Modifying User Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330

Removing User Roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

Deploying Virtual Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

Virtual Machine Placement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332

Deploying Virtual Machines Using the Administrator Console . . . . . 334

Deploying a Virtual Machine Using the Self-Service Portal . . . . . . . . . . . 337

Migrating a VM. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

The Migrate Virtual Machine Action . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340

Drag and Drop the VM onto a Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

Drag and Drop the VM onto a Host Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

Part V Maintaining Guest Session Uptime in a Hyper-V Environment

12 Application-Level Failover and Disaster Recovery in a Hyper-V

Environment 349

Choosing the Best Fault-Tolerance and Recovery Method . . . . . . . . . . . . . . . . . . . . 350

Using Native High-Availability and Disaster-Recovery

Technologies Built in to an Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350

Using Guest Clustering to Protect a Virtual Guest Session. . . . . . . . . . . . 352

Using Host Clustering to Protect an Entire Virtual Host System . . . . 353

Purchasing and Using Third-Party Applications for High

Availability and Disaster Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

Failover Clustering in Windows Server 2008 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354

Windows Server 2008 Cluster Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355

Overview of Failover Clustering in a Hyper-V Host Environment. . . . . . . . . . 358

Failover Cluster Quorum Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358

Shared Storage for Failover Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359

Failover Cluster Node Operating System Selection . . . . . . . . . . . . . . . . . . . . . . 363

Deploying a Failover Cluster for Hyper-V Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363

Installing the Failover Cluster Feature on a Hyper-V Host . . . . . . . . . . . . 365

Running the Validate a Configuration Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . 366

Creating the Hyper-V Host Failover Cluster. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367

Configuring Cluster Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368

Adding Nodes to the Hyper-V Host Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

Adding Storage to the Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371

Cluster Quorum Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372

Creating a Virtual Guest Session on the Host Cluster . . . . . . . . . . . . . . . . . . 373

Configuring Start Actions and Making the Virtual Guest Highly

Available . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374

Configuring Failover and Failback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376

Testing Failover Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

Failover Cluster Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379

Removing Nodes from a Failover Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

Backing Up and Restoring Failover Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380

Failover Cluster Node Backup Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

Restoring an Entire Cluster to a Previous State . . . . . . . . . . . . . . . . . . . . . . . . . . . 381

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383

13 Debugging and Problem Solving the Hyper-V Host and Guest

Operating System 385

Using the Task Manager for Logging and Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . 386

Monitoring Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Monitoring Processes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Monitoring Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387

Monitoring Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388

Monitoring Network Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388

Monitoring User Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389

Using Event Viewer for Logging and Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390

Examining the New Event Viewer User Interface. . . . . . . . . . . . . . . . . . . . . . . . 391

Conducting Additional Event Viewer Management Tasks . . . . . . . . . . . . 395

Performance and Reliability Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399

Resource Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400

Performance Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401

Reliability Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404

Data Collector Sets. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405

Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407

Setting Baseline Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

Reducing Performance Monitoring Overhead . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409

Important Objects to Monitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410

Using the Debugging Tools Available in Windows Server 2008 . . . . . . . . . . . . . 411

TCP/IP Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411

System Startup and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 418

Windows Memory Diagnostics Tool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420

Resources and Support Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421

Common Problems Found in Hyper-V . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

Hyper-V Installation-Related Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422

Hyper-V Networking-Related Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423

Hyper-V Configuration-Related Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424

Hyper-V Miscellaneous Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425

Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427

Best Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428

Index 429

Read More Show Less

Preface

Introduction

Windows Server 2008 shipped with several server roles that provide application services such as Active Directory, web services, thin client Terminal Services, video streaming media services, server virtualization services, and many others. This book focuses on the services specific to server virtualization called Hyper-V.

Hyper-V enables an organization to consolidate several physical server systems into a single host server while still providing isolation between virtual guest session application operations. With an interest to decrease costs in managing their information technology (IT) infrastructure, organizations are virtualizing servers. Bringing multiple physical servers into a single host server decreases the cost of purchasing and maintaining multiple physical server systems, decreases the cost of electricity and air-cooling systems to maintain the physical servers, and enables an organization to go "green" (by decreasing the use of natural resources in the operation of physical server systems).

In addition to covering Hyper-V virtualization in this book, the System Center Virtual Machine Manager 2008 (VMM 2008) product is also covered. VMM 2008 adds management capabilities to Hyper-V. VMM 2008 enables an administrator view and administer virtual guest sessions more easily, delegate administrative rights to others in the management of guest sessions, and use helpful tools to perform specific functions and tasks. Specific functions and tasks supported in VMM 2008 include the ability to take a production server and convert the server to a virtual guest image. In addition, VMM 2008will take an existing virtual session and convert the image into a Hyper-V virtual guest session. These tools make managing, administering, and supporting a Hyper-V session much easier for the administrator.

The authors of this book had the opportunity to work with Windows Server 2008 for more than three years before it was released, and have been involved in the development and deployment of Hyper-V in production environments since the product inception.

It is our hope that we can provide you, the reader of our book, with a lot of really valuable information—not basic marketing fluff that talks about features and functions in Hyper-V and System Center Virtual Machine Manager 2008, but to really dig down into the products and share with you best practices for planning, preparing, implementing, and supporting a Windows 2008 Hyper-V-based virtual environment.

The thing about being involved with a product so early on is that our first experiences with Hyper-V and VMM were without any documentation, without help files that provided guidance, and without any shared experiences from others. We had to learn the technologies from experience, usually the hard way, but that has given us a distinct advantage of knowing the products forward and backward, better than anyone could ever imagine.

So, the pages of this book are filled with years of experience with Hyper-V and VMM 2008, live production environment best practices, and tips and tricks that we hope will help you design, plan, prototype, implement, administer, and support a Windows 2008-based server virtualization environment!

This book is organized into five parts, each part focusing on key Hyper-V and VMM areas, with chapters making up each part. The parts of this book are as follows:

  • Part I: Windows 2008 Hyper-V Overview—This part provides an introduction to Hyper-V not only from the perspective of a general technology overview, but also to note what is truly new in Hyper-V that made it compelling enough for organizations to implement the technology in beta in a production environments. We also cover basic planning, prototype testing, and migration techniques. This part also covers running tools to assess physical servers for consolidation to virtual guest sessions and the process of architecting an enterprise virtual host environment.

  • Part II: Windows 2008 Hyper-V Host and Guest Installation—This part covers the installation of Hyper-V from the perspective of both the host server and the guest virtual sessions. The server installation includes the setup and configuration of Windows Server 2008 and the specific versions that support Hyper-V virtualization. The guest session installation covers the installation of both Microsoft Windows and non-Windows guests that are supported as virtual server sessions within a Hyper-V host environment.

  • Part III: Administering and Maintaining Hyper-V Host Services—This part covers the management, administration, optimization, and maintenance of the Hyper-V host with the tools that come out of the box with Windows Server 2008. As with any application, Hyper-V is best run when the system is properly installed and configured with specific focus on optimizing the memory, disk storage, and processing capabilities of the underlying hardware. Hyper-V distributes resources of a host server across guest sessions, and thus it is important to have the right hardware and system optimization in place.

  • Part IV: System Center Virtual Machine Manager in a Hyper-V Environment—Hyper-V and Windows Server 2008 provide administrative tools for Hyper-V, but the addition of the System Center Virtual Machine Manager 2008 product on top of Hyper-V provides significant enhancements for the management and operations of virtual guest sessions and host-level configuration options. VMM 2008 allows for the extraction of physical server configurations down to virtual guest sessions and for the management of virtual guest templates and ISO disc image files and the provisioning of guest session.

  • Part V: Maintaining Guest Session Uptime in a Hyper-V Environment—This last part of the book covers guest session uptime, debugging, and problem solving intended to help administrators maintain a reliable host and guest virtual environment. Disaster recovery and high availability of guest applications are addressed with regard to the clustering of hosts and guest sessions. In addition, this part addresses application-level high-availability and disaster-recovery technologies built in to common applications in use today.

We hope that our real-world experience with Windows Server 2008 Hyper-V virtualization and our commitment to share that planning, implementation, and support of Hyper-V information will help get you up-to-speed on the latest in virtual server software!


© Copyright Pearson Education. All rights reserved.

Read More Show Less

Customer Reviews

Average Rating 2.5
( 2 )
Rating Distribution

5 Star

(0)

4 Star

(1)

3 Star

(0)

2 Star

(0)

1 Star

(1)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted September 13, 2008

    more efficient use of data centres

    As the cost of data centres continues to rise, companies are searching for ways to more efficiently use their machines. Here Microsoft offers its take, with the book describing how under its MS Windows Server 2008, you can use the Hyper-V virtualisation. The product is not really targeted at the individual home user. You can see this in the second chapter, which is devoted to a high level discussion of the business rationale for a corporate installation of Hyper-V. Indeed, you should read this closely, for it explains in a top down manner why migration could make sense for your company. The rest of the book describes the actual installation and management of Hyper-V. Dealing with gritty and inevitable issues like keeping up with installing service packs and updates. Yes, there will be improvements and bug fixes to this product. Here, Microsoft has built in extensive capabilities for easy maintenance. Now what choices are available for the guest operating systems? Naturally, Microsoft offers its own OSs here. The text goes into some detail about how to install these. No surprise to you, I hope. But commendably, the book also explains how to install a linux based OS under Hyper-V. Reassuring to some sysadmins. A discerning reader might be a little queasy about the prospect of bugs in Hyper-V. Given that it functions as a 'root' operating system (so to speak), a bug in it could be worse than a bug in a child guest operating system that you install inside Hyper-V. But with any virtualisation product, this is the reality that you have to deal with. In this wise, Hyper-V is not at any particular disadvantage vis-a-vis competing products.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted June 5, 2009

    No text was provided for this review.

Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)