510 likes | 515 Views
Learn about the different storage options for virtual machines, including virtual hard disks, directly attached disks, and shared storage. Understand the advantages and considerations for each option, as well as best practices for managing virtual hard disk storage.
E N D
Module 3 Creating and Managing Virtual Hard Disks, Virtual Machines, and Checkpoints
Module Overview • Creating and Configuring Virtual Hard Disks Creating and Configuring Virtual Machines Installing and Importing Virtual Machines Managing Virtual Machine Checkpoints Monitoring Hyper-V
Lesson 1: Creating and Configuring Virtual Hard Disks • What Are the Storage Options for Virtual Machines? Overview of the Hyper-V Virtual Hard Disk Formats Fixed Size and Dynamically Expanding Virtual Hard Disks Differencing Virtual Hard Disks Directly Attached Storage Virtual Hard Disk Sharing and Quality of Service Management Hyper-V Considerations for Virtual Hard Disk Storage
What Are the Storage Options for Virtual Machines? • Virtual hard disk and directly attached disks • Support two storage controller types: • Fixed size, dynamically expanding or differencing disk files • Directly attached disks—local, or on iSCSI or Fibre Channel SAN
Overview of the Hyper-V Virtual Hard Disk Formats • .vhd • Up to 2,048 GB in size • .vhdx • Up to 64 TB in size • Internal log for enhanced resiliency • User defined metadata • Large disk sector support • Larger sector size (improved performance) • Default format in Windows Server 2012 R2 • Can convert between both formats • .vhdx recommended, if not used on older versions of Hyper-V
Differencing Virtual Hard Disks Create Modify Delete Read Grow 1 3 4 1 3 2 4 2 2 4 1 3 File A File D File B • Stores changes from the parent disk • Parent disk should not change • Differencing disk isolate changes • Multiple differencing disks can use same parent • Increases overhead (lower performance) • Can be used for standardized base images • Should avoid in production 1 3 2 4 3 x x x x File C Read-Only
Directly Attached Storage • Virtual machine directly accesses physical disk • Internal or LUN attached to Hyper-V server • Disk must be offline before it can be used • LUN on iSCSI or Fibre Channel SAN • Pass-through disk considerations • Best performance • Unlimited size, lowest CPU utilization • No checkpoints or differencing virtual hard disks • No portability and encapsulation • Not included in Hyper-V backup
Virtual Hard Disk Sharing and Quality of Service Management • Provides shared storage for virtual machines • Used as shared SAS disk by virtual machines • Virtual hard disk must be using VHDX format • Must be connected to virtual SCSI controller • Must be stored on failover cluster • CSV • Scale-out file server with SMB 3.0 • Separation between infrastructure and virtual machines • Storage QoS restrict disk throughput • Configured per virtual hard disk • Dynamically configurable while virtual machine is running
Hyper-V Considerations for Virtual Hard Disk Storage • Virtual hard disks consume large amounts of space • Can increase over time, implement monitoring • Use multiple physical disks for better throughput • Use redundant storage spaces • SSD dramatically increases performance • SMB 3.0 file share • Use SAN for storing virtual hard disks • Specialized, redundant, fast • Shared storage for failover clustering • Exclude VHDs from antivirus scanning
Lesson 2: Creating and Configuring Virtual Machines • What Are the Components of a Generation 1 Virtual Machine? Overview of Generation 2 Virtual Machines Configuring Virtual Machine Settings What Is Dynamic Memory? What Is Smart Paging? • Overview of Integration Services Using a Virtual Fibre Channel Adapter
What Are the Components of a Generation 1 Virtual Machine? • Virtual machine has virtual hardware devices • Only devices that Hyper-V supports can be used • Virtual hardware can be: • Emulated – available during boot • Synthetic – available in supported operating systems • SR-IOV – available in supported operating systems • Prior to Windows Server 2012 R2, only Generation 1 virtual machines were available
Overview of Generation 2 Virtual Machines • Emulated devices are removed • UEFI firmware instead of BIOS • Secure boot • Boots from SCSI controller • PXE boot uses a standard network adapter • Faster boot and operating system installation • Can run side by side with Generation 1 • Generation 1 must be used for legacy systems • Supported guest operating systems • Windows Server 2012 and Windows Server 2012 R2 • 64-bit versions of Windows 8 and Windows 8.1
Configuring Virtual Machine Settings • Only limited options are available during creation • Many more options are available after the virtual machine is created • Configuration options depend on the generation of the virtual machine • Most settings can be configured only if turned off • Adding or removing hardware components • Configuring memory, processor, disk settings • Few settings are configurable while virtual machine is running • Connecting a network adapter to a virtual switch • Adding a virtual hard disk to a SCSI controller • Enable or disable Integration Services • Use Hyper-V Manager or Windows PowerShell • Set-VM, Add-VMHardDiskDrive, Add-VMNetworkAdapter
What Is Dynamic Memory? • More efficient use of available physical memory • Shared resource that can be reallocated automatically • Demand, available memory, and virtual machine memory settings • Dynamic memory settings • Startup RAM • Operating system typically requires more memory when started • Minimum RAM • Can be decreased while virtual machine is running • Maximum RAM • Can be increased while virtual machine is running • Memory buffer • Percentage of extra memory to reserve for a virtual machine • Memory weight • Prioritizes memory allocation when physical memory is low
What Is Dynamic Memory? Finance virtual machine 8 GB Sales virtual machine Engineering virtual machine 6 GB 4 GB 2 GB T = 0 T = 15 T = 30 Total System Memory 8 GB Memory in Use by virtual machines 3 GB Virtual Machines Physical Memory Used 37.5 % Memory Settings
What Is Dynamic Memory? Finance virtual machine 8 GB Sales virtual machine Engineering virtual machine 6 GB 4 GB 2 GB T = 0 T = 15 T = 30 Total System Memory 8 GB Memory in Use by virtual machines 6 GB Virtual Machines Physical Memory Used 75 % Memory Settings
What Is Dynamic Memory? Finance virtual machine 8 GB Sales virtual machine Engineering virtual machine Service virtual machine 6 GB Engineering reaches max allocation 4 GB 2 GB T = 0 T = 15 T = 30 Total System Memory 8 GB Memory in Use by virtual machines 7,5 GB Virtual Machines Physical Memory Used 94 % Memory Settings
What Is Smart Paging? • Memory Management technique that uses physical disk resources as temporary memory • Ensures that a virtual machine can always restart • Used during virtual machine restart only • If Hyper-V is low on memory, and • The virtual machine has more startup than minimum RAM, and • Memory cannot be reclaimed from other virtual machines • Temporarily degrades virtual machine performance • Used only for a limited time, and then removed • Not used when a virtual machine started from the Off state • Virtual machine operating system paging is always preferred
What Is Smart Paging? Finance virtual machine Sales virtual machine 8 GB Engineering virtual machine Service virtual machine 6 GB 4 GB 2 GB T = 0 T = 15 T = 30 Total System Memory 8 GB • Sales virtual machine and Service virtual machine can be restarted only if Smart Paging is used Virtual Machines Memory Settings
Overview of Integration Services • Makes a guest operating system aware that it is running on a virtual machine • Many operating systems include integration services • Install the latest integration services • VMBus and synthetic devices support • Time synchronization, mouse release, VSS • Managed as virtual machine settings
Overview of Integration Services Without Integration Services With Integration Services
Using a Virtual Fibre Channel Adapter • Access to Fibre Channel SAN storage from virtual machine • Hyper-V server has Fibre Channel HBA • Use Virtual SAN Manager to configure a virtual SAN • Virtual Fibre Channel adapter maps to the physical HBAs • Virtual Fibre Channel adapter connects to the Virtual SAN • Storage hardware must support N_Port ID virtualization • Virtual machine can have four virtual Fibre Channel adapters
Lesson 3: Installing and Importing Virtual Machines • Virtual Machine Installation Methods Importing Virtual Machines Virtualizing a Physical Computer The Virtual Machine Connection Application Overview of Enhanced Session Mode
Virtual Machine Installation Methods • Install from a bootable CD/DVD-ROM • Single virtual machine can only use physical media at one time • Install from an .iso file • Multiple virtual machines can use .iso file • Install from a network-based installation server • Generation 1 – legacy network adapter required • Copy virtual hard disk file with operating system installed • Similar to computer cloning • Virtual hard disk should first be generalized • Use differencing virtual hard disks • Parent virtual hard disk should first be generalized • Parent virtual hard disk must not change
Importing Virtual Machines • You can import a virtual machine without first exporting it • Only virtual machine data files are needed • Over 40 different types of issues detected, such as: • Missing parent virtual hard disk • Virtual switch not available • Virtual machine has more processors than available • Import process: • Creates a copy of the virtual machine configuration file • Validates hardware configuration settings • Compiles a list of incompatibilities • Displays incompatibilities and asks for new settings • Removes the configuration file copy • Cannot start older saved states and checkpoints
Virtualizing a Physical Computer • Converting a physical computer to a virtual machine • Hyper-V does not include P2V functionality • Hyper-V can copy content of data disks • Configure disk in New Virtual Hard Disk Wizard • Copy entire disk, not volume or partition • Supported only for data, system disks are not supported • Disk2vhd • Creates virtual hard disks • Uses VSS • Captured system has same identity • Add virtual hard disk to virtual machine
The Virtual Machine Connection Application • Connects to virtual machines on local and remote Hyper-V • Port 2179 used (can be modified in the registry) • Connection allowed by Windows Firewall • Installed as part of Hyper-V role or RSAT feature • Single users can connect to virtual machines • Remote Desktop in virtual machines is not used • Hyper-V Administrators can connect to virtual machines • You can restrict access to virtual machines • Revoke-VMConnectAccesscmdlet
Overview of Enhanced Session Mode • Remote Desktop connection to a virtual machine • Virtual machine can be without network connectivity • Devices can be redirected • Printers, drives, smart cards, audio, other PnP devices • Shared clipboard, enhanced copy • Folder redirection • RDS component is used • User must sign in to virtual machine • Remote Desktop Users group membership required • Enabled at Hyper-V virtual machine connection and virtual machine level • Guest operating system support required • Windows Server 2012 R2 or Windows 8.1 • Available only when the virtual machine is running
Lesson 4: Managing Virtual Machine Checkpoints • What Are Virtual Machine Checkpoints? Implementing Hyper-V Checkpoints Overview of Checkpoints at File Level Exporting Virtual Machines and Checkpoints Issues with Checkpoints in Distributed Environments Checkpoints and Virtual Machine Generation ID
What Are Virtual Machine Checkpoints? • Checkpoint is a point-in-time virtual machine state • Can be taken if virtual machine is not in Paused state • Contains virtual machine configuration, memory and disk state • Does not affect the running state of a virtual machine • Primarily used for testing and development • Can cause issues in distributed production environment • Create differencing disk – decrease performance • Cannot be created for directly attached disks • Used by Hyper-V Replica or in VDI deployments
Implementing Hyper-V Checkpoints • When created, a checkpoint cannot be modified • Only viewed, applied, exported, renamed, or deleted • Checkpoint creation steps: • Pause virtual machine • Create differencing disk for each disk that virtual machine is using • Create a copy of virtual machine configuration • Resume virtual machine • Copy virtual machine memory to disk • Checkpoint consists of • Configuration file (*.xml) • Saved state file (*.vsv) • Memory content (*.bin) • Differencing disks (*.avhd)
Overview of Checkpoints at File Level .vhd .avhd Snapshot Apply (create branch) Apply (= delete Now) Delete (= delete) Delete (= merge)
Exporting Virtual Machines and Checkpoints • Exporting a virtual machine is not required • You can copy virtual machine files • Exporting virtual machine consolidate its files • If differencing drives are used, the entire hierarchy is exported • Exporting multiple virtual machines increases total size • When exporting a virtual machine, all its checkpoints are exported • Exporting a checkpoint exports only a single state • Differencing disks in checkpoint hierarchy are merged • Live export – you can export while a virtual machine is running • Update integration services after import • Discard memory content and saved state from different architecture or pre-Windows 2012 Hyper-V
Issues with Checkpoints in Distributed Environments • Applying a checkpoint takes a virtual machine back to a previous state • Can have serious implications and result in corruption • Vector-clock synchronizations are impacted • Distributed applications depending on increasing logical clock • AD DS, DFS Replication, SQL Server replication • Applying checkpoint rolls back the logical clock • Members of replica set to not converge to the same state • Cryptography - reducing entropy of the random data • Distributed applications using vector clock algorithms have no awareness of running in a virtual environment • Removes changes in virtual machine as if they never happened • User data is lost, passwords are reverted • Regardless of whether they were already synchronized or replicated
Issues with Checkpoints in Distributed Environments DC2 DC1 T1 T4 T3 T2 +100 users USN: 100 Create Checkpoint ID: A RID Pool: 500 - 1000 • Only 50 users are replicated to both domain controllers. Others are either on first or second domain controller. 100 users (RID 500-599) have duplicated SIDs. USN: 200 Time Replication to DC2: USN >100 ID: A RID Pool: 600 - 1000 DC1(A)@USN = 200 DC1(A) @USN = 250 USN: 100 Apply T1 Checkpoint ID: A RID Pool: 500 - 1000 +150 users USN: 250 Replication to DC2: USNs >200 ID: A RID Pool: 650 - 1000
Checkpoints and Virtual Machine Generation ID • Designed to address issues of reverting to a past state • 64-bit integer, tied to a virtual machine configuration • Generation ID passed to a virtual machine in the BIOS • Application can compare current and previous values • If values differ, then something happened to virtual machine • Hypervisor must support virtual machine generation ID • Operating system in virtual machine must be generation ID-aware
Lesson 5: Monitoring Hyper-V • Overview of Performance Monitoring Monitoring a Hyper-V Host Monitoring Virtual Machines Resource Metering in Hyper-V
Overview of Performance Monitoring • Monitors operating system and applications using system resources • Provides up-to-date information on performance • Health of the IT infrastructure • Compare current activity with the baseline • Planning for future requirements • Whether current performance is sufficient • Identifying issues • Detecting problems • Proactive (real-time) and reactive (historical data) • Windows Server 2012 R2 includes several tools • Operations Manager centralizes monitoring, alerting, and reporting for the enterprise
Overview of Performance Monitoring • Task Manager provides local, real-time performance data • Helps to identify and resolve performance-related issues
Overview of Performance Monitoring • Resource Monitor provides in-depth real-time performance data • CPU, Memory, Disk, Network
Overview of Performance Monitoring • Event Viewer shows events that relate to server activity • Collected locally and remotely • Filtering, custom views, attaching tasks to the events
Overview of Performance Monitoring Reliability Monitor provides an historical view of server reliability and associated events
Overview of Performance Monitoring • Performance Monitor provides real-time monitoring and viewing of historical data gathered by data collector sets • Additional performance objects added with server roles
Monitoring a Hyper-V Host • Only Performance Monitor can monitor Hyper-V • Many Hyper-V performance objects added • Other tools monitor only their virtual environment • Parent partition is also considered a virtual machine • Memory, disk and network monitored the same • \Logical Disk(*)\Avg. Disk sec/Read and /Write • \Memory\Available Mbytes • \Network Interface(*)\Bytes Total/sec • Processor utilization based on available resources • Hyper-V allocates resources to each virtual machine • \Processor(*)\% Processor Time shows relative utilization • \Hyper-V Hypervisor Logical Processor(_Total)\% Total Run Time should be used
Monitoring Virtual Machines • Virtual machine tools monitor the virtual environment • Heavy utilization in virtual machine does not mean that Hyper-V host is heavy utilized (and vice versa) • Available resources adjusted based on server load • Memory and disk counters are the same as on the server • Hyper-V performance counters should be used • Hyper-V Hypervisor\Virtual Processors • Hyper-V Hypervisor Logical Processor \% Guest Run Time • Hyper-V Virtual Network Adapter(*)\Bytes/sec • Limit the processor resources that the virtual machine can use