Documente Academic
Documente Profesional
Documente Cultură
MICROSOFT
LEARNING
PRODUCT
6422A
Implementing and Managing Windows Server 2008 Hyper-V
Be sure to access the extended learning content on your Course CD enclosed on the back cover of the book.
ii
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. The names of manufacturers, products, or URLs are provided for informational purposes only and Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission received from any linked site. Microsoft is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement of Microsoft of the site or the products contained therein. 2008 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Hyper-V, Internet Explorer, Microsoft Press, MSDN, PowerPoint, SQL Server, Windows, Windows NT, Windows PowerShell, Windows Server and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.
MICROSOFT LICENSE TERMS OFFICIAL MICROSOFT LEARNING PRODUCTS - TRAINER EDITION Pre-Release and Final Release Versions
These license terms are an agreement between Microsoft Corporation and you. Please read them. They apply to the Licensed Content named above, which includes the media on which you received it, if any. The terms also apply to any Microsoft updates, supplements, Internet-based services, and support services
for this Licensed Content, unless other terms accompany those items. If so, those terms apply. By using the Licensed Content, you accept these terms. If you do not accept them, do not use the Licensed Content. If you comply with these license terms, you have the rights below.
1. DEFINITIONS. a. Academic Materials means the printed or electronic documentation such as manuals,
workbooks, white papers, press releases, datasheets, and FAQs which may be included in the Licensed Content. location, an IT Academy location, or such other entity as Microsoft may designate from time to time. conducted at or through Authorized Learning Centers by a Trainer providing training to Students solely on Official Microsoft Learning Products (formerly known as Microsoft Official Curriculum or MOC) and Microsoft Dynamics Learning Products (formerly know as Microsoft Business Solutions Courseware). Each Authorized Training Session will provide training on the subject matter of one (1) Course. Center during an Authorized Training Session, each of which provides training on a particular Microsoft technology subject matter.
b. Authorized Learning Center(s) means a Microsoft Certified Partner for Learning Solutions
c. Authorized Training Session(s) means those training sessions authorized by Microsoft and
d. Course means one of the courses using Licensed Content offered by an Authorized Learning
e. Device(s) means a single computer, device, workstation, terminal, or other digital electronic or
analog device.
f.
Licensed Content means the materials accompanying these license terms. The Licensed Content may include, but is not limited to, the following elements: (i) Trainer Content, (ii) Student Content, (iii) classroom setup guide, and (iv) Software. There are different and separate components of the Licensed Content for each Course. Software means the Virtual Machines and Virtual Hard Disks, or other software applications that may be included with the Licensed Content.
g.
h. Student(s) means a student duly enrolled for an Authorized Training Session at your location.
i.
Student Content means the learning materials accompanying these license terms that are for use by Students and Trainers during an Authorized Training Session. Student Content may include labs, simulations, and courseware files for a Course. Trainer(s) means a) a person who is duly certified by Microsoft as a Microsoft Certified Trainer and b) such other individual as authorized in writing by Microsoft and has been engaged by an Authorized Learning Center to teach or instruct an Authorized Training Session to Students on its behalf. Trainers and Students, as applicable, solely during an Authorized Training Session. Trainer Content may include Virtual Machines, Virtual Hard Disks, Microsoft PowerPoint files, instructor notes, and demonstration guides and script files for a Course. Virtual Hard Disks means Microsoft Software that is comprised of virtualized hard disks (such as a base virtual hard disk or differencing disks) for a Virtual Machine that can be loaded onto a single computer or other device in order to allow end-users to run multiple operating systems concurrently. For the purposes of these license terms, Virtual Hard Disks will be considered Trainer Content. Microsoft Virtual PC or Microsoft Virtual Server software that consists of a virtualized hardware environment, one or more Virtual Hard Disks, and a configuration file setting the parameters of the virtualized hardware environment (e.g., RAM). For the purposes of these license terms, Virtual Hard Disks will be considered Trainer Content. you means the Authorized Learning Center or Trainer, as applicable, that has agreed to these license terms.
j.
k. Trainer Content means the materials accompanying these license terms that are for use by
l.
m. Virtual Machine means a virtualized computing experience, created and accessed using
n.
2. OVERVIEW.
Licensed Content. The Licensed Content includes Software, Academic Materials (online and electronic), Trainer Content, Student Content, classroom setup guide, and associated media. License Model. The Licensed Content is licensed on a per copy per Authorized Learning Center location or per Trainer basis.
3. INSTALLATION AND USE RIGHTS. a. Authorized Learning Centers and Trainers: For each Authorized Training Session, you
may: i. either install individual copies of the relevant Licensed Content on classroom Devices only for use by Students enrolled in and the Trainer delivering the Authorized Training Session, provided that the number of copies in use does not exceed the number of Students enrolled in and the Trainer delivering the Authorized Training Session, OR
ii. install one copy of the relevant Licensed Content on a network server only for access by classroom Devices and only for use by Students enrolled in and the Trainer delivering the Authorized Training Session, provided that the number of Devices accessing the Licensed Content on such server does not exceed the number of Students enrolled in and the Trainer delivering the Authorized Training Session. iii. and allow the Students enrolled in and the Trainer delivering the Authorized Training Session to use the Licensed Content that you install in accordance with (ii) or (ii) above during such Authorized Training Session in accordance with these license terms.
i.
Separation of Components. The components of the Licensed Content are licensed as a single unit. You may not separate the components and install them on different Devices.
ii. Third Party Programs. The Licensed Content may contain third party programs. These license terms will apply to the use of those third party programs, unless other terms accompany those programs.
b. Trainers:
i. Trainers may Use the Licensed Content that you install or that is installed by an Authorized Learning Center on a classroom Device to deliver an Authorized Training Session.
ii. Trainers may also Use a copy of the Licensed Content as follows:
A. Licensed Device. The licensed Device is the Device on which you Use the Licensed Content.
You may install and Use one copy of the Licensed Content on the licensed Device solely for your own personal training Use and for preparation of an Authorized Training Session. personal training Use and for preparation of an Authorized Training Session.
B. Portable Device. You may install another copy on a portable device solely for your own 4. PRE-RELEASE VERSIONS. If this is a pre-release (beta) version, in addition to the other provisions
in this agreement, these terms also apply:
a. Pre-Release Licensed Content. This Licensed Content is a pre-release version. It may not
contain the same information and/or work the way a final version of the Licensed Content will. We may change it for the final, commercial version. We also may not release a commercial version. You will clearly and conspicuously inform any Students who participate in each Authorized Training Session of the foregoing; and, that you or Microsoft are under no obligation to provide them with any further content, including but not limited to the final released version of the Licensed Content for the Course. Microsoft, without charge, the right to use, share and commercialize your feedback in any way and for any purpose. You also give to third parties, without charge, any patent rights needed for their products, technologies and services to use or interface with any specific parts of a Microsoft software, Licensed Content, or service that includes the feedback. You will not give feedback that is subject to a license that requires Microsoft to license its software or documentation to third parties because we include your feedback in them. These rights survive this agreement.
b. Feedback. If you agree to give feedback about the Licensed Content to Microsoft, you give to
c. Confidential Information. The Licensed Content, including any viewer, user interface, features
and documentation that may be included with the Licensed Content, is confidential and proprietary to Microsoft and its suppliers. i. Use. For five years after installation of the Licensed Content or its commercial release, whichever is first, you may not disclose confidential information to third parties. You may disclose confidential information only to your employees and consultants who need to know the information. You must have written agreements with them that protect the confidential information at least as much as this agreement. Survival. Your duty to protect confidential information survives this agreement.
ii.
iii. Exclusions. You may disclose confidential information in response to a judicial or governmental order. You must first give written notice to Microsoft to allow it to seek a
protective order or otherwise protect the information. Confidential information does not include information that d. becomes publicly known through no wrongful act; you received from a third party who did not breach confidentiality obligations to Microsoft or its suppliers; or you developed independently.
Term. The term of this agreement for pre-release versions is (i) the date which Microsoft informs you is the end date for using the beta version, or (ii) the commercial release of the final release version of the Licensed Content, whichever is first (beta term). Use. You will cease using all copies of the beta version upon expiration or termination of the beta term, and will destroy all copies of same in the possession or under your control and/or in the possession or under the control of any Trainers who have received copies of the pre-released version. Copies. Microsoft will inform Authorized Learning Centers if they may make copies of the beta version (in either print and/or CD version) and distribute such copies to Students and/or Trainers. If Microsoft allows such distribution, you will follow any additional terms that Microsoft provides to you for such copies and distribution.
e.
f.
ii. Virtual Hard Disks. The Licensed Content may contain versions of Microsoft XP, Microsoft Windows Vista, Windows Server 2003, Windows Server 2008, and Windows 2000 Advanced Server and/or other Microsoft products which are provided in Virtual Hard Disks. A. If the Virtual Hard Disks and the labs are launched through the Microsoft Learning Lab Launcher, then these terms apply: Time-Sensitive Software. If the Software is not reset, it will stop running based upon the time indicated on the install of the Virtual Machines (between 30 and 500 days after you install it). You will not receive notice before it stops running. You may not be able to access data used or information saved with the Virtual Machines when it stops running and may be forced to reset these Virtual Machines to their original state. You must remove the Software from the Devices at the end of each Authorized Training Session and reinstall and launch it prior to the beginning of the next Authorized Training Session. B. If the Virtual Hard Disks require a product key to launch, then these terms apply: Microsoft will deactivate the operating system associated with each Virtual Hard Disk. Before installing any Virtual Hard Disks on classroom Devices for use during an Authorized Training Session, you will obtain from Microsoft a product key for the operating system software for the Virtual Hard Disks and will activate such Software with Microsoft using such product key. C. These terms apply to all Virtual Machines and Virtual Hard Disks:
You may only use the Virtual Machines and Virtual Hard Disks if you comply with the terms and conditions of this agreement and the following security requirements: o o You may not install Virtual Machines and Virtual Hard Disks on portable Devices or Devices that are accessible to other networks. You must remove Virtual Machines and Virtual Hard Disks from all classroom Devices at the end of each Authorized Training Session, except those held at Microsoft Certified Partners for Learning Solutions locations. You must remove the differencing drive portions of the Virtual Hard Disks from all classroom Devices at the end of each Authorized Training Session at Microsoft Certified Partners for Learning Solutions locations. You will ensure that the Virtual Machines and Virtual Hard Disks are not copied or downloaded from Devices on which you installed them. You will strictly comply with all Microsoft instructions relating to installation, use, activation and deactivation, and security of Virtual Machines and Virtual Hard Disks. You may not modify the Virtual Machines and Virtual Hard Disks or any contents thereof. You may not reproduce or redistribute the Virtual Machines or Virtual Hard Disks.
o o o o
ii. Classroom Setup Guide. You will assure any Licensed Content installed for use during an
Authorized Training Session will be done in accordance with the classroom set-up guide for the Course. iii. Media Elements and Templates. You may allow Trainers and Students to use images, clip art, animations, sounds, music, shapes, video clips and templates provided with the Licensed Content solely in an Authorized Training Session. If Trainers have their own copy of the Licensed Content, they may use Media Elements for their personal training use. iv. iv Evaluation Software. Any Software that is included in the Student Content designated as Evaluation Software may be used by Students solely for their personal training outside of the Authorized Training Session.
b. Trainers Only:
i. Use of PowerPoint Slide Deck Templates. The Trainer Content may include Microsoft PowerPoint slide decks. Trainers may use, copy and modify the PowerPoint slide decks only for providing an Authorized Training Session. If you elect to exercise the foregoing, you will agree or ensure Trainer agrees: (a) that modification of the slide decks will not constitute creation of obscene or scandalous works, as defined by federal law at the time the work is created; and (b) to comply with all other terms and conditions of this agreement.
ii. Use of Instructional Components in Trainer Content. For each Authorized Training Session, Trainers may customize and reproduce, in accordance with the MCT Agreement, those portions of the Licensed Content that are logically associated with instruction of the Authorized Training Session. If you elect to exercise the foregoing rights, you agree or ensure the Trainer agrees: (a) that any of these customizations or reproductions will only be used for providing an Authorized Training Session and (b) to comply with all other terms and conditions of this agreement.
iii. Academic Materials. If the Licensed Content contains Academic Materials, you may copy and use the Academic Materials. You may not make any modifications to the Academic Materials and you may not print any book (either electronic or print version) in its entirety. If you reproduce any Academic Materials, you agree that:
The use of the Academic Materials will be only for your personal reference or training use You will not republish or post the Academic Materials on any network computer or broadcast in any media; You will include the Academic Materials original copyright notice, or a copyright notice to Microsofts benefit in the format provided below: Form of Notice: 2008 Reprinted for personal reference use only with permission by Microsoft Corporation. All rights reserved. Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the US and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners.
6. INTERNET-BASED SERVICES. Microsoft may provide Internet-based services with the Licensed
Content. It may change or cancel them at any time. You may not use these services in any way that could harm them or impair anyone elses use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.
7. SCOPE OF LICENSE. The Licensed Content is licensed, not sold. This agreement only gives you some
rights to use the Licensed Content. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation, you may use the Licensed Content only as expressly permitted in this agreement. In doing so, you must comply with any technical limitations in the Licensed Content that only allow you to use it in certain ways. You may not install more copies of the Licensed Content on classroom Devices than the number of Students and the Trainer in the Authorized Training Session; allow more classroom Devices to access the server than the number of Students enrolled in and the Trainer delivering the Authorized Training Session if the Licensed Content is installed on a network server; copy or reproduce the Licensed Content to any server or location for further reproduction or distribution; disclose the results of any benchmark tests of the Licensed Content to any third party without Microsofts prior written approval; work around any technical limitations in the Licensed Content; reverse engineer, decompile or disassemble the Licensed Content, except and only to the extent that applicable law expressly permits, despite this limitation; make more copies of the Licensed Content than specified in this agreement or allowed by applicable law, despite this limitation; publish the Licensed Content for others to copy;
transfer the Licensed Content, in whole or in part, to a third party; access or use any Licensed Content for which you (i) are not providing a Course and/or (ii) have not been authorized by Microsoft to access and use; rent, lease or lend the Licensed Content; or use the Licensed Content for commercial hosting services or general business purposes. Rights to access the server software that may be included with the Licensed Content, including the Virtual Hard Disks does not give you any right to implement Microsoft patents or other Microsoft intellectual property in software or devices that may access the server.
8. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and
regulations. You must comply with all domestic and international export laws and regulations that apply to the Licensed Content. These laws include restrictions on destinations, end users and end use. For additional information, see www.microsoft.com/exporting. Content marked as NFR or Not for Resale.
9. NOT FOR RESALE SOFTWARE/LICENSED CONTENT. You may not sell software or Licensed 10. ACADEMIC EDITION. You must be a Qualified Educational User to use Licensed Content marked as
Academic Edition or AE. If you do not know whether you are a Qualified Educational User, visit www.microsoft.com/education or contact the Microsoft affiliate serving your country. fail to comply with the terms and conditions of these license terms. In the event your status as an Authorized Learning Center or Trainer a) expires, b) is voluntarily terminated by you, and/or c) is terminated by Microsoft, this agreement shall automatically terminate. Upon any termination of this agreement, you must destroy all copies of the Licensed Content and all of its component parts.
11. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you
12. ENTIRE AGREEMENT. This agreement, and the terms for supplements, updates, Internet-
based services and support services that you use, are the entire agreement for the Licensed Content and support services.
13. APPLICABLE LAW. a. United States. If you acquired the Licensed Content in the United States, Washington state law
governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. The laws of the state where you live govern all other claims, including claims under state consumer protection laws, unfair competition laws, and in tort.
b. Outside the United States. If you acquired the Licensed Content in any other country, the laws
of that country apply.
14. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the
laws of your country. You may also have rights with respect to the party from whom you acquired the Licensed Content. This agreement does not change your rights under the laws of your country if the laws of your country do not permit it to do so.
15. DISCLAIMER OF WARRANTY. The Licensed Content is licensed as-is. You bear the risk of
using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non-infringement.
16. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO U.S. $5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES. This limitation applies to anything related to the Licensed Content, software, services, content (including code) on third party Internet sites, or third party programs; and claims for breach of contract, breach of warranty, guarantee or condition, strict liability, negligence, or other tort to the extent permitted by applicable law.
It also applies even if Microsoft knew or should have known about the possibility of the damages. The above limitation or exclusion may not apply to you because your country may not allow the exclusion or limitation of incidental, consequential or other damages. Please note: As this Licensed Content is distributed in Quebec, Canada, some of the clauses in this agreement are provided below in French. Remarque : Ce le contenu sous licence tant distribu au Qubec, Canada, certaines des clauses dans ce contrat sont fournies ci-dessous en franais. EXONRATION DE GARANTIE. Le contenu sous licence vis par une licence est offert tel quel . Toute utilisation de ce contenu sous licence est votre seule risque et pril. Microsoft naccorde aucune autre garantie expresse. Vous pouvez bnficier de droits additionnels en vertu du droit local sur la protection dues consommateurs, que ce contrat ne peut modifier. La ou elles sont permises par le droit locale, les garanties implicites de qualit marchande, dadquation un usage particulier et dabsence de contrefaon sont exclues. LIMITATION DES DOMMAGES-INTRTS ET EXCLUSION DE RESPONSABILIT POUR LES DOMMAGES. Vous pouvez obtenir de Microsoft et de ses fournisseurs une indemnisation en cas de dommages directs uniquement hauteur de 5,00 $ US. Vous ne pouvez prtendre aucune indemnisation pour les autres dommages, y compris les dommages spciaux, indirects ou accessoires et pertes de bnfices. Cette limitation concerne: tout ce qui est reli au le contenu sous licence , aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et les rclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilit stricte, de ngligence ou dune autre faute dans la limite autorise par la loi en vigueur.
Elle sapplique galement, mme si Microsoft connaissait ou devrait connatre lventualit dun tel dommage. Si votre pays nautorise pas lexclusion ou la limitation de responsabilit pour les dommages indirects, accessoires ou de quelque nature que ce soit, il se peut que la limitation ou lexclusion ci-dessus ne sappliquera pas votre gard. EFFET JURIDIQUE. Le prsent contrat dcrit certains droits juridiques. Vous pourriez avoir dautres droits prvus par les lois de votre pays. Le prsent contrat ne modifie pas les droits que vous confrent les lois de votre pays si celles-ci ne le permettent pas.
xi
Acknowledgement
Microsoft Learning would like to acknowledge and thank the following for their contribution towards developing this title. Their effort at various stages in the development has ensured that you have a good classroom experience.
xii
xiii
xiv
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
Lesson 1: Using the VMM Library Lesson 2: Managing the Image Library in VMM Lab A: Using the VMM Library Lesson 3: Managing Checkpoints Lab B: Managing Checkpoints 8-3 8-14 8-23 8-33 8-39
xv
Course Description
This three-day instructor-led course teaches you how to implement and manage Microsoft Windows Server 2008 Hyper-V. It also teaches you how to manage Hyper-V with Solution Center Virtual Machine Manager (SCVMM) and with PowerShell.
Audience
The primary audience for this course is Windows Server 2003/2008 System Administrators who manage and implement Server Virtualization technologies within their network. The secondary audience for this course is Enterprise System Architects who plan enterprise server resources with an emphasis on server consolidation.
Student Prerequisites
In addition to your professional experience, you should have technical knowledge in the following areas: Windows Server 2000/2003 System Administration Server Virtualization using Virtual Server 2005 or Virtual PC
xvi
Course Objectives
After completing this course, you will be able to: Install and configure Windows Server 2008 Hyper-V Understand Hyper-V Virtual Networking Understand the types of Virtual Hard Drives and their benefits Create and manage Virtual Machines on the Hyper-V server Understand how to configure the Hyper-V server to ensure high availability Monitor the performance of the Hyper-V server Understand how to use existing virtual machines in the Hyper-V server Understand the issues with migrating existing Virtual Machines to Hyper-V Understand how System Center Virtual Machine Manager (SCVMM) can be used to manage Hyper-V servers throughout the enterprise Use PowerShell to manage the Hyper-V server and the virtual machines hosted on the Hyper-V server Implement a disaster recovery plan for Virtual Machines on Hyper-V
xvii
Course Outline
This section provides an outline of the course: Module 1, Introduction to Windows Server 2008 Hyper-V introduces the concepts related to and the history of server virtualization. Through this module, the you will understand the business need for virtualization and how virtualization fits into their existing environment. Selecting the required hardware and basic installation and configuration are also covered. Module 2, Configure Hyper-V Settings and Virtual Networks provides information on the configuration options available on the Hyper-V server and the Hyper-V Virtual Networks. Module 3, Hyper-V Remote Administration explores the requirements for remote management of the Hyper-V Server and the tools available for remote management. Module 4, Creation of Virtual Machines and Virtual Hard Drives explores the creation of the Hyper-V Virtual Machines and their associated Virtual Hard Drives. The options available for the Virtual Machines and the types of Virtual Hard Drives will be covered. This module also covers the importance of Hyper-V Integration Services and Hypervisor. Module 5, Virtual Machine Settings, Snapshots, and High Availability explores the settings available on each Virtual Machines hosted on the Hyper-V server and how to use and manage Virtual Machine snapshots. The module will also cover configuring Hyper-V for high availability and performance monitoring on the Hyper-V server. Module 6, Migration of Virtual Machines to Hyper-V provides instruction on how to migrate virtual machines hosted on earlier virtualization technologies to the Hyper-V server. Module 7, Introduction to System Center Virtual Machine Manager introduces System Center Virtual Machine Manager and shows how it can be used to manage Hyper-V servers throughout an enterprise. Module 8, Managing the SCVMM Virtual Machine Image Library and Checkpoints explores the Virtual Machine image library and checkpoints available in System Center Virtual Machine Manager. Module 9, PowerShell and Disaster Recovery explores how to use PowerShell to manage the Hyper-V server. This module also explores how to backup virtual machines in Hyper-V.
xviii
Course Materials
The following materials are included with your kit: Course Handbook. A succinct classroom learning guide that provides all the critical technical information in a crisp, tightly-focused format, which is just right for an effective in-class learning experience. Lessons: Guide you through the learning objectives and provide the key points that are critical to the success of the in-class learning experience. Labs: Provide a real-world, hands-on platform for you to apply the knowledge and skills learned in the module. Lab Answer Keys: Provide step-by-step lab solution guidance at your finger tips when its needed.
Course CD. Provides additional resources pertaining to this course. Resources: Include well-categorized additional resources that give you immediate access to the most up-to-date premium content on TechNet, MSDN, and Microsoft Press. Lab Answer Keys: Include answer keys in digital form to use during lab time. Virtual Machine Build Guide: Provides the step-by-step information needed recreate the Virtual Machine/Server images with appropriate configuration. Send Us Your Feedback Instructions: Provide you with an opportunity to send feedback on the all aspects of the course. Student Course Files: Include the Allfiles.exe, a self-extracting executable file that contains all the files required for the labs and demonstrations.
Note: To open the Web page, insert the Course CD into the CD-ROM drive, and then in the root directory of the CD, double-click StartCD.exe.
Course evaluation. At the end of the course, you will have the opportunity to complete an online evaluation to provide feedback on the course, training facility, and instructor. To provide additional comments or feedback on the course, send e-mail to support@mscourseware.com. To inquire about the Microsoft Certification Program, send e-mail to mcphelp@microsoft.com.
xix
Software Configuration
The following software is installed on each VM: Windows Server 2008 Enterprise System Center Virtual Machine Manager 2008 Beta
Course Files
There are files associated with the labs in this course. The lab files are located in the folder E:\ModXX\Labfiles on the student computers.
Classroom Setup
Each classroom computer will have the same virtual machine configured in the same way.
xx
*Striped In addition, the instructor computer must be connected to a projection display device that supports SVGA 800 x 600 pixels, 256 colors.
1-1
Module 1
Introduction to Windows Server 2008 Hyper-V
Contents:
Lesson 1: Introducing Windows Server 2008 Hyper-V Lesson 2: Hyper-V Requirements Lesson 3: Installing the Hyper-V Server Role Lesson 4: Configure Hyper-V to Be Highly Available Lab: Install Hyper-V and Perform Initial Configuration 1-3 1-11 1-18 1-25 1-29
1-2
Module Overview
Microsoft Windows Server 2008 Hyper-V is a hypervisor-based virtualization platform that runs on Windows Server 2008 x64 Edition. Hyper-V allows you to create and manage virtual workloads running in virtual machines. Hyper-V provides a robust, scalable platform that enables customers to virtualize workloads that previously required physical hardware to achieve desired performance. Hyper-V is a role of Windows Server 2008, and is installed using Server Manager.
1-3
Lesson 1
This lesson focuses on the history of Microsoft virtualization technology and strategy. It also introduces Hyper-V and the benefits of using Hyper-V.
1-4
Key Points
Microsoft has been providing powerful virtualization tools for years. Benefits include: Server consolidation Increased agility
1-5
Key Points
Microsoft offers a toolset of virtualization products that addresses all the layers your customers manage. Our portfolio extends from the data center to the desktop: Server virtualization-run multiple guest operating system on a single server. With Windows Server 2008 this feature will be part of the operating system. There is also a stand alone product, Microsoft Hyper-V Server available. Application virtualization-run any application without installing it to the operating system. Presentation virtualization-execute an application on one computer and present it in another. Desktop virtualization-run multiple operating systems on a single desktop computer.
Question: For each type of virtualization, describe at least one scenario where that virtualization solution can be applied.
1-6
Key Points
With the Microsoft virtualization strategy and the potential to leverage x64-based hardware, there is great promise to reduce total cost of ownership (TCO) while expanding the benefits and services to organizations. Question: Describe scenarios in your organization where virtualization technologies would provide benefits.
1-7
Introducing Hyper-V
Key Points
Windows Server 2008 includes Hyper-V, a powerful virtualization technology that enables businesses to take advantage of the benefits of virtualization without having to buy third-party software. This helps to: Reduce IT costs Increase hardware utilization Optimize business and network infrastructure Improve server availability
Question: Do you anticipate running any other operating systems with Hyper-V, in your environment?
1-8
Hyper-V Benefits
Key Points
Hyper-V is ideal for server consolidation in both the data center and the remote site, enabling organizations to make more efficient use of their hardware resources. Hyper-V provides the ability to test large scale enterprise applications with its support for up to four virtual processors, and up to 64 GB of RAM per VM. Hyper-V includes powerful business continuity features, such as live backup, quick migration, and automatic virtual machine failover. With features like flexible resource control and quick migration, it is possible to create a dynamic IT environment that leverages virtualization to not only respond to problems, but to anticipate increased demands..
Question: Describe one or more challenges your organization is currently planning to address using server virtualization.
1-9
Key Points
Microsoft Hyper-V Server 2008 provides a simplified, reliable, and optimized virtualization solution, enabling improved server utilization and reduced costs. Since Hyper-V Server is a dedicated stand-alone product, which contains only the Windows Hypervisor, Windows Server driver model and virtualization components, it provides a small footprint and minimal overhead. It easily plugs into customers existing IT environments, leveraging their existing patching, provisioning, management, support tools, processes, and skills. IT Pros can easily to leverage their existing knowledge and skills with Microsoft virtualization products, as well as the collective knowledge of the community, minimizing any learning curve. In addition, with Microsoft providing comprehensive support for Microsoft applications and heterogeneous guest operating systems, customers can implement virtualization with confidence and peace of mind.
1-10
Microsoft Hyper-V Server 2008 is a great choice for customers who want a basic and simplified virtualization solution for consolidating servers as well as for development and test environments. Hyper-V Server 2008 only offers the most basic of virtualization features, making it ideal for: Test and Development Basic Server Consolidation Branch Office Consolidation Hosted Desktop Virtualization (VDI)
Customers who require richer and more robust virtualization features, such as Quick Migration, multi-site clustering, large memory support (greater than 32 GB of RAM), and more than four processors on the host server, should use Windows Server 2008. Windows Server 2008 provides business continuity, disaster recovery, greater scalability for consolidating large workloads, and flexible and cost-effective virtualization rights (one free virtual instance for Standard Edition, four free virtual instances for Enterprise Editions, and unlimited virtual instances for Datacenter Edition with the purchase of a license of Windows Server 2008). Question: What is the difference between Hyper-V and Microsoft Hyper-V Server?
1-11
Lesson 2
Hyper-V Requirements
This lesson focuses on evaluating existing environments and looks at the requirements for running Hyper-V.
1-12
Key Points
When choosing the appropriate 64-bit solution for your business, many variables must be considered, including: Some applications are only available on particular architectures, while others provide a choice of server platforms. Performance and scalability requirements will influence your choice of server in terms of processors and RAM, as well as your choice of Windows Server edition. Clustering and Network Load Balancing features support increased availability for planned and unplanned downtime, helping to improve business continuity.
Question: List the considerations you analyze when matching a server platform to a workload.
1-13
Key Points
Hyper-V introduces several new features related to virtual machine storage hardware. You can use Storage Manager for SANs to create and manage logical unit numbers (LUNs) on both Fibre Channel and Internet SCSI (iSCSI) disk storage subsystems in your storage area network (SAN). Because of hardware, protocol, and security differences, LUN configuration and management are different in Fibre Channel and iSCSI environments.
1-14
Memory Requirements
Key Points
The 64-bit architecture can address far more memory than virtualization platforms based on 32-bit architecture can. The 64-bit hypervisor used in Hyper-V supports both 32-bit and 64-bit guest operating systems, which can run alongside each other on the same Hyper-V host. Question: What is the maximum number of virtual machines that can be hosted on a single Hyper-V server?
1-15
CPU/BIOS Requirements
Key Points
In addition to the systems requirement for Windows Server 2008, the two most important requirements for the Hyper-V platform are to ensure that the server: Is a 64-bit environment Supports hardware-assisted virtualization (Intel VT or AMD-V) technology
Question: Are Intel VT and AMD-V hardware or BIOS features? Where are Intel VT and AMD-V enabled or disabled?
1-16
Network/NIC Requirements
Key Points
Hyper-V makes use of virtual switches to control and secure network traffic that enters and leaves virtual machines. Virtual Local Area Network (VLAN) support in Hyper-V provides increased network security for virtual machines by making it possible to restrict network communication from a virtual machine to a specific VLAN. Virtual network cards in Hyper-V support Pre-boot Execution Environment (PXE) startup using only the legacy network adapter.
Question: Why does the legacy adapter work without installing a virtual machine driver?
1-17
Key Points
There are two steps to ensuring that Hyper-V is installed and functioning correctly. The hypervisor must be installed and running The Hyper-V Virtual Machine Management service must be running
Question: How many Hyper-V Services appear to be started in the Services snapin?
1-18
Lesson 3
This lesson focuses on identifying specific business requirements, domain membership considerations, the Microsoft Assessment and Planning tool, as well as the process of installing the Hyper-V role on Windows Server 2008 Full Installation and Server Core.
1-19
Key Points
Technology changes rapidly and 64-bit processors are quickly becoming the norm in the business world of today. Virtually all new Windows Servers products ship with x64 processors, and are capable of running Windows Server x64 editions. Windows Server x64 editions offer the best way to take full advantage of this hardware.
Question: Describe two or three workloads in your organization that are candidates for virtualization.
1-20
Key Points
It is important to evaluate the system requirements for the particular business roles and workloads which will be virtualized. Picking out appropriate hardware resources for workloads is important. Also important is planning high availability needs and solutions. Question: What type of business roles do you support in your organization?
1-21
Key Points
Domain Membership is not required for Hyper-V however it can be a member of a domain. Active Directory directory service allows the same directory management features to be used for virtual machines as are used for physical computers. This enables centralized management of groups of Hyper-V servers using the existing management tools that are familiar to administrators.
Question: Describe one or more scenarios in which a Hyper-V server should be a domain member.
1-22
Key Points
The Microsoft Assessment and Planning Solution Accelerator makes it easy for you to assess your current IT infrastructure and determine the right Microsoft technologies for your IT needs. The data and analysis provided by this Solution Accelerator can significantly simplify the planning process for migrating to Hyper-V. The Microsoft Assessment and Planning Solution Accelerator expands upon the assessment features included in the Windows Vista Hardware Assessment Solution Accelerator.
1-23
Key Points
Windows Server 2008 Hyper-V is only available for x64 Editions of Windows Server 2008 RTM. Hyper-V cannot be enabled on systems running inside virtual machines or on x86 versions of Windows Server 2008. Question: Describe the approximate percentage of your organizations servers that currently use x64 operating systems.
1-24
Key Points
Installing the Hyper-V role on Windows Server 2008 with Server Core is a simple process. Type start /w ocsetup Microsoft-Hyper-V to enable Hyper-V role. Restart the server when prompted.
Question: Describe one or more scenarios in which Hyper-V on Windows Server Core would be a good solution for virtualization needs in your organization.
1-25
Lesson 4
This lesson focuses on aspects of Hyper-V that make it highly available such as failover clustering, disk structure and network heartbeat.
1-26
Key Points
A failover cluster, formerly known as a server cluster, is a group of independent computers that work together to increase the availability of applications and services. Windows Server 2008 Failover Clustering provides high availability for HyperV by allowing virtual machines to migrate between nodes in the cluster during downtime. When planned downtime occurs, the Failover Clustering Service moves affected virtual machines to another cluster node. When unplanned downtime occurs, the Failover Clustering Service will automatically restart virtual machines on a surviving cluster node.
Question: Describe one or more scenarios where Windows Failover Clustering used with Hyper-V would offer benefits.
1-27
Disk Structure
Key Points
A Hyper-V host is a server running Windows Server 2008. Hyper-V supports multiple storage options. Hyper-V supports directly-attached storage, such as SATA and SAS; or SAN storage such as Fibre Channel and iSCSI. After you expose the disks to the host, you can expose it to the guest in many different ways.
Question: Describe one or more scenarios in which advanced storage options be a good solution in use in your work environment?
1-28
Network Heartbeat
Key Points
Hyper-V provides a network heartbeat service called the virtual machine heartbeat which can be installed on guest operating systems as part of Integration Services. The heartbeat service can be enabled in Hyper-V Settings in the Integration Services section of the Hyper-V Manager. Question: Where is the virtual machine heartbeat status displayed?
1-29
1-30
1-31
1-32
Review Questions
1. 2. 3. Is Hyper-V available for X86 editions of Windows Server 2008? What happens when unplanned downtime occurs? How are you notified if a virtual machine stops responding?
2-1
Module 2
Configure Hyper-V Settings and Virtual Networks
Contents:
Lesson 1: Configuring Hyper-V Options Lesson 2: Configuring the Virtual Network Lab: Configuring Hyper-V and Virtual Networks 2-3 2-11 2-17
2-2
Module Overview
This module provides information on the configuration options available on the Hyper-V server and Hyper-V Virtual Networks. When these configuration options are set correctly they offer increased performance and greater security to your virtual machines.
2-3
Lesson 1
This lesson explores the configurable settings available in the management console. Setting the folder locations for VHD and Snapshot files is important to disk performance. Use Authorization Manager to assign permissions which will benefit you when configuring security.
2-4
Key Points
You can change the default locations for storing the virtual hard disks (C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks) and the virtual machine configuration files (C:\ProgramData\Microsoft\Windows\Hyper-V) in the Hyper-V settings. Best Practices: Name the VHD Location folder according to the function of the virtual machine (C:\Users\Public\Documents\Hyper-V\Virtual Hard Disks\SQL). Verify there is sufficient storage space for .VHD files and virtual machines.
Question: Can a file share be used to store virtual machine configuration data?
2-5
Key Points
The Hyper-V Manager allows you to set the Snapshot Location. Hyper-V snapshots are a point in time image of a virtual machine including data and state. Hyper-V snapshots are not an appropriate backup strategy. You can change the virtual machine settings after applying a snapshot-but you cannot change the snapshot settings themselves.
Question: What is the difference between Volume Shadow Copy Service snapshots and Hyper-V snapshots?
2-6
Key Points
Saving Virtual Hard Disk and Virtual Machine Configuration files on drives other than the system drive will enhance performance. If a pass-through disk is being used in a Failover Cluster, the configuration file must be placed on a separate file share located on a non-cluster node or on a File Server cluster. This file share containing the configuration file must be accessible by all nodes in the cluster and the security on the file share must allow for read and write access. Question: What will occur if the configuration files are moved to the same location as the virtual hard disk files?
2-7
Key Points
The Authorization Manager snap-in loads the Hyper-V Authorization Store used in configuring security in Hyper-V. Users that are not members of the Local Administrators group can be given permission to create and manage virtual machines in Hyper-V. To accomplish this requires using the built in Authorization Management (AzMan) framework that is part of Microsoft Windows Server 2008. The Authorization Manager framework allows Hyper-V to be configured to restrict what virtual machines users can manage and what they can do with those machines.
2-8
Key Points
When you connect to a virtual machine on which the integration services are not installed, the mouse pointer is displayed as a dot in the guest operating system. The default setting for the release key is CTRL+ALT+LEFT ARROW. In Hyper-V Manager you can configure an alternative Mouse Release Key combination.
Question: How many other options are there for an alternative Release Key?
2-9
Key Points
Not all client and server operating systems are supported as guests in Hyper-V. There is a restricted list of server and client operating systems that will be supported when running as a guest in Hyper-V. It is very important to make a distinction between supported and compatible. There are operating systems that are compatible with Hyper-V but will not be supported. Typically, this means the Integration Services cannot be installed in the guest operating system even if a virtual machine was successfully created in Hyper-V.
2-10
Enlightened means that the guest operating system is running a version of the kernel that is aware it is running in a virtualized environment. Enlightenments are enhancements made to the operating system to help reduce the cost of certain operating system functions like memory management. One example of an operating system enlightenment that comes with Hyper-V is translation look-aside buffer (TLB) flushing. The TLB helps to protect memory and improve CPU hardware memory access performance by caching Virtual Address to Physical Address translations.
Question: What considerations are important in your organization when choosing to use a compatible but not supported operating system?
2-11
Lesson 2
This lesson focuses on Virtual Networking in Hyper-V. You will use the Virtual Network Manager tool to configure settings. Configure virtual switches to control and secure network traffic. Use Virtual Local Area Network (VLAN) Tagging to isolate internal and external networks. You will also learn to access network resources with different options. Configuring Virtual Network settings properly in Hyper-V will help to ensure that your virtual machines function properly and access the correct network resources securely.
2-12
Key Points
The Virtual Network Manager is used to configure all networking for the virtual machines running on the Hyper-V Server. Virtual Network Manager enables you to create and manage virtual networks. You can use Virtual Network Manager to add, remove, and modify the virtual networks. Virtual Network Manager is available from Hyper-V Manager. Only one virtual network can be attached to a specific physical network adapter at a time; you cannot attach multiple virtual networks to the same physical network adapter. You cannot connect a virtual network to a wireless network adapter. As a result, you cannot provide wireless networking capabilities to virtual machines.
Question: Which type of network allows a virtual machine to have access to a physical network? In what scenarios would you use this type of network?
2-13
Key Points
Virtual networks can be used by Child Partitions to communicate: On a physical network connected to the parent partition. On a network that is common to the physical machine to gain access to data in the Parent partition. With other child partitions running on the Hyper-V server but no other network. On a totally isolated and private network that is accessible only by the child partitions running on the Hyper-V server.
Question: Describe the steps you would use to isolate virtual machines from the physical network?
2-14
Virtual Switches
Key Points
Hyper-V makes use of virtual switches to control and secure network traffic that enters and leaves virtual machines. A Hyper-V virtual switch can be associated with a physical network Virtual Local Access Network (VLAN) tag to limit network communication over that virtual switch to a specific VLAN. Only one Hyper-V virtual switch can be associated with a single physical network adapter.
Question: Describe one or more differences between a virtual switch and a virtual network.
2-15
VLAN Tagging
Key Points
The Virtual Network Manager also provides for VLAN isolation on external and internal networks but not on private networks. If using an external network configuration that is mapped to a physical NIC in the parent partition, the physical NIC must be configured for VLAN support on the physical network. The Hyper-V role of Windows Server 2008 can specify a VLAN tag for the virtual machine network connection and for the parent partition network connection. A virtual machine may have multiple network adapters, and all of these adapters are not required to use the same VLAN IDs.
Question: Describe one or more ways VLANs can be used to support security or performance requirements.
2-16
External/Private/Internal
Key Points
The network or Internet resources available depend on the configuration of the network adapters used for the virtual machine. Three types of virtual networks can be configured: Externalthis network binds to a physical network adapter on the Hyper-V server so that the virtual machine can have access to a physical network. Internalthis network is for use by the virtual machines that are running on the Hyper-V server. Virtual machines on this network can communicate with each other and with the parent partition but not external to the physical machine. Privatethis network can only be used by the virtual machines; there is no association with any physical network adapter in the parent partition.
Question: For each virtual network type describe at least one scenario where that virtual network could be used.
2-17
2-18
Create a new virtual machine called SEA-SQL-02 with the following settings: Memory: 1024 MB Network Connection: Virtual Network Adapter
Change the settings on SEA-SQL-02 to the following values: Memory: 512 MB Processor: 2 Logical Processors Explore the additional options available for the processor
Results: After this exercise, you will have successfully configured the Hyper-V Server Settings and created a new virtual machine.
2-19
2-20
Review Questions
1. 2. 3. Where is the option to change the location of the .VHD and virtual machines? What does it mean when the mouse pointer displays as a small dot in a virtual machine window? List the available virtual network types and describe typical usages for each.
3-1
Module 3
Hyper-V Remote Administration
Contents:
Lesson 1: Configuring Hyper-V Remote Administration Lesson 2: Connecting to Hyper-V Remotely Lab: Accessing and Managing Hyper-V Remotely 3-3 3-6 3-10
3-2
Module Overview
This module provides information about which clients can be used to remotely administer Hyper-V and how Hyper-V is managed through Windows Management Instrumentation (WMI). It also provides information about Windows Firewall settings and the Remote Desktop Protocol. At the conclusion of this module you will be able to configure and connect to Hyper-V for remote administration.
3-3
Lesson 1
After completing this lesson, you will know how WMI is used in managing Hyper-V and which Windows clients can be used to remotely administer Hyper-V. Installing the right client will ensure that your remote management of Hyper-V is successful.
3-4
Key Points
The Microsoft Windows Vista SP1 KB952627 Update Package includes: The Hyper-V Manager which is a Microsoft Management Console (MMC) snap-in that provides management access to a Windows Server 2008-based server that uses the Hyper-V role. The Virtual Machine Connection which is a remote connection tool that you can use to establish an interactive session on a virtual machine.
3-5
WMI
Key Points
Hyper-V is managed through Windows Management Instrumentation (WMI). The Hyper-V WMI Provider exposes objects that control all aspects of Hyper-V including: Managing server settings Creating and configuring virtual machines Creating and configuring Virtual Network switches Controlling the state of running virtual machines
Question: List one or more scenarios in which automated management through WMI scripting could provide benefit to your organization. List one or more scenarios in which automated management would not be an effective tool.
3-6
Lesson 2
This lesson focuses on Windows Firewall Settings and the Remote Desktop Protocol. This lesson will examine the configuration of Windows Firewall to successfully connect to Hyper-V remotely. You will become familiar with which applications that will allow you to connect to Hyper-V for remote administration.
3-7
Firewall Settings
Key Points
When you install the Hyper-V role or the Remote Server Administration Tools the installation program configures the firewall rules for remote management. You can confirm the firewall settings. On the Start menu, in Administrative Tools, open Windows Firewall with Advanced Security. For remote management in a domain environment, no further configuration is necessary.
Question: What two groups of rules are configured in Windows Firewall with Advanced Security for Remote Management of Hyper-V?
3-8
Key Points
Terminal Services RemoteApp (TS RemoteApp) enables organization to provide access to standard Microsoft Windowsbased programs from virtually any location to users of any Windows Vistabased or Windows Server 2008based computer, or to users of any Windows XP with Service Pack 2 (SP2)based or Windows Server 2003 with Service Pack 1 (SP1)based computer that have the new Remote Desktop Connection (RDC) client installed. Terminal service connectivity using a Remote Desktop Protocol (RDP) connection is also a way to gain local access to the Hyper-V Management interface on a Hyper-V Server. Virtual Machine Connection (vmconnect.exe) is a tool that you use to connect to a virtual machine so that you can install or interact with the guest operating system in a virtual machine. Virtual Machine Connection connects using an RDP connection.
3-9
The primary supported methods for remotely connecting to Hyper-V servers include the Hyper-V Management interface or the System Center Virtual Machine Manager (SCVMM) interface.
Question: Describe one or more scenarios in which RDP management of Hyper-V would be useful.
3-10
3-11
Review the settings for the following Outbound Rules: Hyper-V - WMI (TCP-Out) Hyper-V Management Clients - WMI (TCP-Out).
Results: After this exercise, you should have reviewed the Windows Firewall with Advanced Security settings for remotely managing Hyper-V.
3-12
3-13
3-14
Review Questions
1. 2. 3. List important configuration considerations when using the Hyper-V Management Console to manage a remote Hyper-V server. Does Hyper-V expose a COM API for scripted management? List one or more methods for managing Hyper-V without using the Hyper-V Management Console.
4-1
Module 4
Creating Virtual Hard Drives and Virtual Machines
Contents:
Lesson 1: Creating Virtual Hard Drives Lesson 2: Creating Virtual Machines Lab: Creating Virtual Hard Drives and Virtual Machines 4-3 4-12 4-23
4-2
Module Overview
This module explores the creation of the Hyper-V Virtual Machines and their associated Virtual Hard Disks (VHDs). The options available for the virtual machines (VMs), and the types of Virtual Hard Disks will be covered. This module also covers the importance of Hyper-V Integration Components and Hypervisor. Through the creation of VHDs and VMs, an IT administrator can virtualize his or her local environment, which will help reduce management and hardware costs. In addition IT Administrators now have the opportunity to use a virtualized environment for testing and development.
4-3
Lesson 1
A virtual hard disk provides storage for a virtual machine. Within the virtual machine, the virtual hard disk is represented as a physical disk and is used by the virtual machine as if it were a physical disk. There are many different types of virtual hard disks, that have various advantages and disadvantages. Selecting the correct virtual hard disk format is important, because when data is stored in a virtual hard disk, it can be time-consuming to migrate it to a different virtual hard disk type.
4-4
Key Points
There are several different types of virtual hard disks (VHDs) available in Hyper-V: Dynamically expanding VHDs are virtual disks that start very small and then grow as data is written to the disk. Dynamically expanding VHDs are ideal for use in an environment where performance isnt the most important consideration. Test and development environments are often ideal applications for this type of VHDs. Fixed-size virtual hard disks are disks that use as much physical disk space as specified when the disk is created. For example, if you create a 100 gigabyte (GB) fixed size VHD, it will use 100 GB of physical disk space. Use fixed-size VHDs when performance and ease of deployment is a concern. Typically, a production scenario requires greater performance, making fixed-size VHDs the ideal solution.
Question: Describe two or three scenarios when you would use a dynamic disk. Describe two or three scenarios when you would use a fixed disk.
4-5
Pass-through Disks
Key Points
In addition to fixed-size disks and dynamic disks, Hyper-V allows for the use of a pass-through disk type. Pass-though disks are a different type of storage option where an external data source is associated with a virtual machine and the virtual machine writes directly to the data source without encapsulation in a virtual hard disk. Compatible data sources include physical disks, partitions and LUNs. With pass-through disks, there is no vhd.
4-6
Key Points
Another disk type Hyper-V offers is the differencing disk. A new feature in Hyper-V is the snapshot. Differencing disks store all state changes to a virtual machine or virtual hard disk in a separate file. Changes are isolated from the original VHD. A differencing disk applies to only one virtual hard disk. With a differencing disk you can revert to the state of the base VHD by removing the differencing disk. Snapshots are a point-in-time copy of the virtual machine. When a snapshot is mad, it creates a special type of differencing disk, having a file extension of .avhd.
4-7
Key Points
There are two hardware disk types available for Hyper-V: SCSI and IDE. IDE supports four devices. SCSI supports 256 devices. IDE devices can be both emulated and synthetic. When a VM first boots up, IDE is emulated. However, during the boot process a bypass filter is loaded enabling IDE devices be used as synthetic devices. SCSI devices are Synthetic only. In Hyper-V SCSI is Synthetic and uses the Virtual Machine BUS (VMBUS). The SCSI I/O operations pass from the Child (Guest) Partition to the root over VMBUS and enter the I/O stack. After I/O completes, its completion is sent over VMBUS.
4-8
Key Points
When creating a new virtual machine, it needs a virtual hard disk. The virtual hard disk wizard is used to create new virtual hard disks for new or existing virtual machines. You can create a virtual hard disk without working through the pages of the wizard. If you click Finish on this page, the wizard creates a dynamically expanding virtual hard disk that has a storage capacity of 127 gigabytes. The virtual hard disk wizard can be found within the Hyper-V virtual machines settings page.
4-9
Question: What are the specifications of a default virtual hard disk created using the virtual hard disk wizard?
4-10
Key Points
You can use the Edit Virtual Hard Disk Wizard to perform the following actions on virtual hard disks: Compact, Convert, Expand, Merge, and Reconnect. Compact: Applies to dynamically expanding virtual hard disks and differencing virtual hard disks. Reduces the size of the .vhd file by removing blank space that is left behind when data is deleted from the virtual hard disk. Convert: Converts a dynamically expanding virtual hard disk to a fixed virtual hard disk, or a fixed virtual hard disk to a dynamically expanding virtual hard disk. Expand: Increases the storage capacity of a dynamically expanding virtual hard disk or a fixed virtual hard disk.
4-11
Merge: Applies to differencing disks only. Merges the parent disk with the differencing disk. Reconnect: Applies to differencing disks only. If you select a differencing disk and the parent virtual hard disk cannot be located, this page appears automatically.
Question: What are the benefits to using an NTFS file system when compacting a VHD?
4-12
Lesson 2
After you have a virtual hard disk ready you can create a virtual machine. This module introduces some considerations related to VM configuration, Integration Components, and operating system duplication. Correctly creating and configuring VMs is important because once a VM is running, only certain parts of its configuration can be modified.
4-13
HyperVisor
Key Points
The hypervisor is responsible for creating, managing, and destroying partitions. The 64-bit micro-kernelized hypervisor architecture uses the VMBus to enable high-speed data transfer to and from the host operating system driver stack. The host operating system driver stack uses Microsoft Windows Certified drivers to enable broad hardware compatibility combined with stability. Because device drivers are in the host operating system, the hypervisor remains small. The hypervisor is a single binary that contains several components (for example, scheduler, partition management, and virtual processor management).
4-14
Question: What is the host operating system referred to as? What are the VMs referred to as?
4-15
Key Points
As with the Virtual Disk Wizard, the Virtual Machine wizard will walk you through the steps necessary to create a Virtual Machine. The New Virtual Machine Wizard provides you with a simple and flexible way to create a virtual machine. The New Virtual Machine Wizard is available from Hyper-V Manager.
Question: What are the specs of a VM created using the default wizard options?
4-16
Question: What are the specifications of a default virtual machine created using the New Virtual Machine wizard?
4-17
Integration Components
Key Points
Integration components are user mode processes that run in the guest operating system which provide a limited amount of communication between the host and guest environments. Some examples include: time synchronization, guest operating system shutdown, data exchange and backup support. Question: Describe the procedure for installing the Integration Components.
4-18
4-19
Key Points
After the virtual machine has been created and the guest operating system and integration components have both been installed, the sysprep tool will help prepare the virtual machine for duplication. The purpose of sysprep is to make the system as generic as possible so that any image taken of a system prepared with sysprep can then be applied to different hardware. Using sysprep will roll back the operating system installation. The next time that Windows installation boots up, all of the system information is regenerated.
Question: What activation issues do you need to take into consideration when duplicating a VM?
4-20
Key Points
One common scenario in virtualization is copying VHD files. If the VHD file contains a guest operating system, it should first be prepared for duplication. When the VHD has been prepared for duplication, there are several ways to copy the VHD. Through the use of Xcopy a VHD file can be copied to a new location. Using the Hyper-V Management Console import/export wizard to copy a VM to a new location. Using PowerShell scripting to import and/or export a virtual machine.
4-21
A common usage scenario in virtualization is moving a virtual machine from one host to another. These are the steps to take: 1. 2. 3. Shut down the guest operating system. Move all storage resources to the new location. Restart the virtual machine at the new location.
Question: In what scenario might you need to move a VM from one host to another?
4-22
PXE Boot
Key Points
The Pre-Boot Execution Environment (PXE) provider for Windows Deployment Services provides client boot services over the network. PXE registers itself with the WDSServer service (the main server-side service of the Windows Deployment Services solution) and requests a remote procedure call (RPC) endpoint. PXE technology is a standard created by Intel that establishes a common and consistent set of pre-boot services within the boot firmware. The end goal is to enable a client to perform a network boot and receive a network boot program (NBP) from a network boot server. PXE booting requires the Legacy Network Adapter and will not work with the Synthetic Network Adapter.
Question: What is the benefit of enabling PXE Booting in the Hyper-V VM?
4-23
4-24
Task 3: Creating a new virtual hard disk from a physical hard drive
Using the New Virtual Hard Disk Wizard, create a new dynamic disk by copying the contents of the 6422-Hyper-V computers system drive with the following settings: Name: SEA-Hyper-V-01.vhd Replicating the C:\ drive Location: D:\Virtual Hard Disks
Results: After this exercise, you should have 3 VHD files. Cancel the creation of SEA-Hyper-V-01.vhd creation.
4-25
4-26
Task 4: Connect to the virtual machine and install Windows Server 2008
For your final task, you will install Windows Server 2008 onto the newly created virtual machine. Start SEA-WEB-01 and install Windows Server 2008 Enterprise (Server Core Installation).
Results: After this exercise, you should have one virtual machine created from the previous exercises VHDs, and Windows Server 2008 installing on the VM.
4-27
Review Questions
1. 2. 3. What different types of virtual hard disks does Hyper-V support? What are the Integration Components and why should they be installed? What options are available in the Edit Disk wizard?
5-1
Module 5
Virtual Machine Settings, Snapshots, and High Availability
Contents:
Lesson 1: Managing Virtual Machine Settings Lesson 2: Using Virtual Machine Snapshots Lesson 3: Configuring Hyper-V for High Availability Lesson 4: Monitoring Hyper-V Performance Lab: Managing Virtual Machines 5-3 5-7 5-12 5-21 5-25
5-2
Module Overview
This module explores the settings available on each Virtual Machine hosted on a Hyper-V server and how to use and manage Virtual Machine snapshots. This module will also cover configuring Hyper-V for high availability and performance monitoring on a Hyper-V server.
5-3
Lesson 1
Virtual Machine Settings provide you with a way to adjust the configuration of a virtual machine after you create the virtual machine. Some of the settings are selfexplanatory and may not be covered during this lesson.
5-4
Key Points
After you create a virtual machine, you can customize it by configuring the virtual machines settings. For example, you can: Configure the virtual machine BIOS settings Configure the virtual machine Processor settings Change the amount of memory allocated to the virtual machine
Question: How would you configure a VM to allow software with a bootable CD to be installed?
5-5
Configuring Peripherals
Key Points
The IDE Controller settings allow you to add a hard drive or CD/DVD Drive to the IDE Controller. You can configure networking for virtual machines by adding, removing, and modifying their network adapters as necessary.
Question: Describe one or more scenarios that might require non-default VM peripheral settings.
5-6
Key Points
Integration services are a set of services that help Hyper-V Virtual Machines have a more consistent state and perform better. Below are several examples: Enhanced usability of the guest operating system desktop computer through mouse pointer integration. Enhanced performance of some operating systems by providing access to the VMBus. Enabling of the guest operating system to use synthetic devices. Automatic start and stop actions that enable you to determine what actions to take when the physical machine starts and stops. VSS integration for live-backup of running VMs.
Question: What are the benefits of installing Integration Services on a Hyper-V virtual machine?
5-7
Lesson 2
Snapshots are a new feature of Microsoft Windows Server 2008 Hyper-V. Snapshots are a point in time version of a virtual machine. Snapshots have replaced Microsoft Virtual PC and Microsoft Virtual Server undo disks. The primary benefit of snapshots in Hyper-V is that it allows administrators to quickly and easily create hierarchies of changes and to have the ability to revert back to them at any time.
5-8
Snapshot Overview
Key Points
A snapshot is a point-in-time copy of a virtual machine. A snapshot does not change the state of the virtual machine. A snapshot does not change the virtual machine when it is deleted.
5-9
Snapshot Implementation
Key Points
These are the steps taken when a snapshot of a running virtual machine is created: The virtual machine pauses. A new differencing disk is created for each virtual hard disk, and then the virtual machine is configured to use the new differencing disk(s). A copy of the virtual machines configuration file is created. The virtual machine resumes. When the virtual machine is running, the contents of the virtual machines memory are saved to disk.
5-10
Managing Snapshots
Key Points
The Hyper-V Manager provides several tools for managing snapshots: Snapshots can be created in the Hyper-V Manager. Select a virtual machine, and on the Action menu or panel, click Snapshot. When a virtual machine with snapshots has been selected, the snapshots pane of the Hyper-V Manager appears below the Virtual Machines pane. The Action panel provides several options when a Snapshot is selected: Settings Apply Rename
5-11
Delete Snapshot The specific point in time is no longer available as a restore point. If the last snapshot in a chain is removed the content is merged into the parent .vhd file.
5-12
Lesson 3
Virtualization technology helps businesses reduce their overall TCO. Unfortunately, virtualization introduces a major problem: single point of failure. Here is an example of a single point of failure: Within a non-virtualized environment, Contoso has 20 workloads. Each workload is on one physical server. When one of server goes down, there are problems; however, the problems are manageable and not catastrophic. When Contoso has switched to a virtualized environment, there are now 20 workloads running on a single physical server. When that single physical server goes down, all 20 workloads go down. This is a catastrophic event that will have severe consequences.
As was shown in the above example, high availability is a very important consideration. Hyper-V has been designed with high availability in mind.
5-13
Key Points
High availability can be defined as the implementation of a system design that ensures a high level of operational continuity over a given time. Planned downtime is the result of management-initiated events, such as maintenance. Unplanned downtime is the result of events not within direct control of IT administrators.
5-14
Availability is often expressed numerically as the percentage of time that a service is available for use. Microsoft provides failover clustering in Windows Server 2008 Enterprise and Windows Server 2008 Datacenter, which keeps both applications and operating systems highly available.
5-15
Quick Migration
Key Points
Quick Migration is the combination of Hyper-V and Failover Clustering technologies. Quick migration can be used with server workloads and applications that normally would not be cluster-aware. Windows Server 2008 Enterprise Edition or Windows Server 2008 Datacenter Edition is required for Quick Migration.
5-16
Quick Migration is particularly useful for: Scheduled maintenance of host hardware Scheduled updates to host software Operating systems or applications that could not normally run in a cluster Maintaining high availability
Question: Describe one or more scenarios in which Quick Migration would be useful. Describe one or more scenarios in which Quick Migration would not meet operational requirements.
5-17
Key Points
Scenario Overview: Two physical host Servers consisting of Node 1, and Node 2. Public Network connects the cluster nodes to the virtual machines, network resources , such as Domain Controller, and routers. Private Network is used exclusively for cluster-related network traffic, and connects the nodes to the shared storage, such as Fibre Channel, or iSCSI.
5-18
Key Points
To perform quick migration, you must first set up a cluster with your servers. Cluster configuration and setup in Windows Server 2008 has been streamlined. Using the wizard, an entire cluster is created in one step. The wizard asks for a name for the cluster and which servers will be in the cluster; the wizard handles the rest of the cluster setup. The first step is installing Windows Server 2008 Enterprise Edition or Windows Server 2008 Datacenter Edition in the same domain on the host servers that will become the cluster nodes. Next, you can set up and configure the server cluster using the wizards.
Question: Describe the likely effect of shared storage hardware on cluster performance.
5-19
Key Points
After step one is finished, you are ready to create a virtual machine and set up the host cluster using the Hyper-V virtualization feature in Windows Server 2008. You can use Hyper-V to easily create a virtual machine with the New Virtual Machine Wizard. After you have your virtual machine residing on the shared storage, you can create the host cluster.
Question: What types of shared storage are compatible with Failover Clustering in Windows Server 2008?
5-20
Key Points
When your virtual machine is online, you can use quick migration to quickly move it between your host servers. To perform a quick migration, start in the Failover Cluster Management console. Right-click the virtual machine name; the Actions menu appears. You now have the option to move the virtual machine to another node and you can choose the destination node.
Question: What variables affect the amount of time required to complete a Quick Migration?
5-21
Lesson 4
Monitoring Hyper-V performance requires more than just using the Task Manager to view CPU usage. The Windows Server 2008 Performance Monitor provides 24 counter sets for Hyper-V that can be used to help you monitor and troubleshoot performance-related issues.
5-22
Performance Monitor
Key Points
Windows Server 2008 includes Windows Reliability and Performance Monitor, which provides you with tools to monitor and assess system performance and reliability. Do not use the Task Manager in the parent partition to view CPU usage information for virtual machines running on a Hyper-V server. For accurate CPU usage, you should use Performance and Reliability Monitor to view the data from Hyper-V performance counters.
5-23
Key Points
It is very difficult to get an exact look at CPU usage due to virtual machine CPU usage happening in several different places. One place that CPU cycles are consumed is inside the child partition. The Hyper-V manager displays CPU usage for child partitions. Additionally, the child partition CPU usage can be found in the Performance Monitor through the % Guest Run Time counter, which is found in the Hyper-V Hypervisor Virtual Processor section of counters. Another location that can use CPU cycles is in the hypervisor when it is handling intercepts, switching contexts, and performing other tasks. This CPU usage can be tracked using the Performance Monitor % Hypervisor Run Time counter, which is found in the Hyper-V Hypervisor Virtual Processor section of counters.
5-24
Another place that CPU gets used is in the worker process in the parent partition. Each running virtual machine has a worker process in the parent partition. This is where operations, like saving the state of the virtual machine or taking snapshots, is handled. It is also where emulated devices are run.
Question: What considerations would you include in CPU capacity planning decisions for a Hyper-V host?
5-25
5-26
Start up and shutdown settings: Automatic Start Action: Always start automatically Automatic Stop Action: Save State
Change processor and startup settings for SEA-SQL-01. Processor settings: Virtual machine reserve: 20% Virtual machine limit: 80% Relative weight: 50
Start up and shutdown settings: Automatic Start Action: Always start automatically Automatic Stop Action: Shut down
5-27
Start up and shutdown settings: Automatic Start Action: Always start automatically Automatic Stop Action: Save State
Results: After this exercise, you will have successfully configured the VM settings for the virtual machines.
5-28
5-29
Review Questions
1. 2. 3. How is the Integration Services component installed on a virtual machine? Why is high availability important when planning a virtualized environment? What tool should be used to monitor the performance of a host and the VMs on the host?
6-1
Module 6
Migration of Virtual Machines to Hyper-V
Contents:
Lesson 1: Migrating Legacy Virtual Machines Lesson 2: Understanding the Impact of Migrated VMs Lab: Migrating Legacy Virtual Machines to Hyper-V 6-3 6-8 6-11
6-2
Module Overview
This module examines the process for migrating Virtual Machines from various legacy platforms to Microsoft Windows Server 2008 Hyper-V. This module will also cover the impact of the migration to Hyper-V and what to be aware of when performing migrations. As Hyper-V becomes more widely deployed throughout an organization, it is important to be able to both create new VMs and migrate existing VMs to Hyper-V. Migrating existing VMs to Hyper-V preserves the investment in those VMs.
6-3
Lesson 1
Migrating a Microsoft Virtual Server or Microsoft Virtual PC is a simple process with only a few primary considerations. Likewise, importing and exporting Hyper-V virtual machines is simplified with the use of the wizards. Microsoft System Center Virtual Machine Manager enables the management of VMware virtual machines. This module describes which VM types can be migrated to Hyper-V.
6-4
Key Points
When migrating a virtual hard disk (VHD) from Virtual Server 2005 or Virtual PC to Hyper-V the guest operating system needs to be prepared for the new location. For example, the guest operating systems network configuration will need to be compatible with the new location. A change in hardware may mean that the product activation may be triggered on the guest operating system. After the guest operating system has been prepared for the new location, the VHD needs to be prepared for the migration. There are four simple steps in the migration of a Virtual Server 2005 or Virtual PC VHD: 1. 2. First, the VM Additions must be removed. After the VM Additions have been removed the VHD is copied to the new location.
6-5
3. 4.
A new Hyper-V VM is created with the VHD. The Integration Components (IC) are installed.
Question: Is there a scenario in which the ICs would not be installed on the guest operating system after migration?
6-6
Key Points
The Hyper-Vs import and export tools are used to move virtual machines from host to host. The Import tool will load the exported virtual machine, read the configuration file, and will then run the VM at the import location. The export tool gathers all related files of a Hyper-V virtual machine and places them into a specified folder. Question: Other than to move a VM from host to host, what other use is there for the export tool?
6-7
Key Points
Sometimes it is not always possible to migrate a legacy virtual machine. For example, if you have a legacy VMware VM which you do not want to recreate or attempt to migrate , then a single management tool for use in mixed environments may be the right solution for you. The System Center family of products gives you the ability to manage physical servers alongside your virtual machines with a single set of integrated tools. System Center Virtual Machine Manager provides a single management tool for mixed environments. The Add a VirtualCenter wizard within the VMM will automatically import the ESX host records from a VMware Virtual Center Server (VCS).
Question: What are the benefits to using VMM to manage VMware VMs?
6-8
Lesson 2
The new Hyper-V Integration Services .replaces the Virtual Server 2005 and Virtual PC VM Additions and provides several new features. Additionally, there are potential issues to be aware of when attempting to move VMs to a new chipset. The information in this lesson will help you avoid these potential issues.
6-9
Key Points
Integration Components replace Virtual Server 2005 and Virtual PC VM Additions. Integrations components are sets of drivers and services that help Windows Server 2008 Hyper-V Virtual Machines maintain a more consistent state and perform better by enabling the guest to use synthetic devices. New features and improvements are included with the Integration Components. For example, the VMBus provides transport for synthetic devices, both of which are new features. As a best practice to ensure the most optimal performance, use the Integration Components synthetic devices whenever possible. Synthetic devices are new with Hyper-V and are designed to have the lowest overhead for devices.
Question: Why is it a best practice to always install the Integration Components if they are available for the guest operating system?
6-10
Key Points
When moving a VHD from Virtual Server 2005 or Virtual PC the processor type will not adversely affect the booting of the Virtual Machine. However, there are times when the chipset difference is an issue: Moving Saved States of a virtual machine will not work when moving to a different chipset. The Saved States must be merged before moving a virtual machine. When a VHD is moved from Virtual PC or Virtual Server 2005 to Hyper-V, the virtualized hardware changes. This may cause the activation feature to trigger.
Question: When migrating a Virtual PC or Virtual Server 2005 VHD to Hyper -V, what are some things that you should have available?
6-11
6-12
6-13
6-14
Review Questions
1. 2. 3. What is the first thing you should do before migrating a VM from Virtual PC or Virtual Server 2005? When migrating VHDs from Virtual Server 2005 or Virtual PC, when will a change in chipset become a potential problem? How can you manage VMware VMs?
7-1
Module 7
Introduction to System Center Virtual Machine Manager
Contents:
Lesson 1: Introducing System Center Virtual Machine Manager Lesson 2: Managing Virtual Machines with VMM Lab: Using VMM to Manage Hyper-V 7-3 7-11 7-25
7-2
Module Overview
Server virtualization allows IT administrators greater control over provisioning and management of their server infrastructure. The Microsoft System Center family of products is a comprehensive solution optimized for the management of Microsoft Windows Server operating systems running in the virtual data center. System Center Virtual Machine Manager 2008 provides centralized administration of virtual machine infrastructure, helps increase physical server utilization, and enables rapid provisioning of new virtual machines by the administrator and authorized end users.
7-3
Lesson 1
System Center Virtual Machine Manager (VMM) 2008 is specifically designed to work with Windows Server 2008 with Hyper-V. Using VMM will give administrators a solution to manage their Hyper-V virtual machines.
7-4
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. Question: What is your experience working with System Center applications? Question: What are some concerns you may have managing Hyper-V? Question: How does VM management differ from managing physical computers? Question: How do you currently automate administration?
7-5
Key Points
The System Center family of products provides users with a complete IT management solution. System Center Virtual Machine Manager (VMM) delivers support for consolidating multiple physical servers within a virtual infrastructure, thereby helping to increase overall utilization of physical servers. VMM also enables administrators and authorized users to rapidly provision virtual machines. System Center Data Protection Manager 2007 provides continuous data protection on physical and virtual machines for backup and business continuity. System Center Operations Manager 2007 provides a solution for unified health monitoring of physical and virtual machines. System Center Configuration Manager provides a solution for change and configuration.
7-6
Question: If you are currently using virtualization technologies in your organization, what benefits have you noticed from using virtual machines instead of physical machines? Question: If you aren't currently using virtualization technologies in your organization, what possible benefits could you see in your organization by using Hyper-V and System Center applications?
For more information, see Microsoft System Center Virtual Machine Manager General Overview white paper.
7-7
VMM Benefits
Key Points
System Center Virtual Machine Manager 2008 (VMM) can provide and number of benefits to your organization. VMM: Helps automate common VM operations. Helps optimize VM placement and management. Integrates with Microsoft Windows PowerShell.
For more information, see About VMM Components. For more information, see Top Ten Benefits of VMM 2008.
7-8
VMM Components
Key Points
Virtual Machine Manager Server The Virtual Machine Manager Server is the core process that communicates with the virtual machine hosts. Virtual Machine Host VMM hosts are physical servers running the following virtualization software: Microsoft Virtual Server 2005 R2 Microsoft Windows Server 2008 Hyper-V VMware ESX
Virtual Machine Library Server The VMM library is a catalog of resources that can be used to create and configure virtual machines in VMM. Virtual Machine Manager Administrator Console The VMM Administrator Console is a graphical user-interface (GUI) that allows administrators to effectively manage an environment of hundreds of virtual machines.
7-9
Windows PowerShell Command-Line Interface The new Windows PowerShell command line shell and scripting language helps IT administrators more easily control systems and accelerate automation. Virtual Machine Manager Self-Service Portal The VMM Self-Service Portal is an optional, Web-based component that a VMM administrator can configure to allow end users to create and manage their own virtual machines within a controlled environment. Microsoft SQL Server Database VMM stores performance and configuration data, virtual machine settings, and other virtual machine metadata in a local SQL Server 2005 database.
For more information, see About VMM Components. For more information, see System Center Virtual Machine Manager 2008: General Overview" white paper.
7-10
Key Points
Be sure to provision adequate server hardware for your VMM servers. You must have x64 hardware and provide good RAM capacity. Ensure adequate disk space because VMM libraries can become quite large. Faster processors and more RAM will facilitate better VMM performance.
Question: Based on the VMM requirements, will you implement VMM on a dedicated or shared server?
7-11
Question: How do you import virtual machines located on a host? Question: What types of information can you view about a virtual machine?
For more information, see What's New in System Center Virtual Machine Manager 2008?
7-12
Lesson 2
VMM provides a single location to create virtual machines. Virtual machines can be created from a pre-existing virtual hard disk, or you can use VMM to create a new virtual hard disk. In addition, VMM can be used to convert physical computers to virtual machines. After creating virtual machines, VMM gives you tools to effectively manage these virtual machines.
7-13
Key Points
In the Virtual Machine Manager Administrator Console, you can use the following options in the Actions pane to open a wizard used to create virtual machines: New virtual machine The New Virtual Machine Wizard can be used to create a new virtual machine from an existing virtual machine, template, or virtual hard disk stored in the library. This wizard can also be used to create a new virtual machine from a blank virtual hard disk. Clone virtual machine The clone virtual machine action skips the initial New Virtual Machine Wizard page, Select Source, because the source is automatically set to be the existing virtual machine that was selected in Virtual Machines view. Convert physical server The Convert Physical Server Wizard is used to perform physical-to-physical (P2V) conversions. Convert virtual machine The Convert Virtual Machine Wizard is used to perform virtual-to-virtual (V2V) conversions.
7-14
Question: List one or more scenarios when you would choose to create a virtual machine from a physical computer.
7-15
Key Points
The P2V conversion process captures an image of the source disk and modifies the operating system and drivers to make them compatible with the Hyper-V emulated hardware. There are two P2V processes that you can use: online and offline. Online conversion does not require a restart of the source computer. VMM uses the Volume Shadow Copy Service (VSS) to create an image of the source machine. Offline P2V does not use VSS.
Question: For each type of conversion describe one or more scenarios where you would choose that conversion type.
For more information, see Converting Physical Computers to Virtual Machines in VMM.
7-16
Key Points
The process for running a V2V conversion from the UI is as follows: 1. 2. Copy the .vmx file and each .vmdk file for the VMware virtual machine to the Virtual Machine Manager library. Run the Convert Virtual Machine Wizard, which performs the following steps: 3. Identifies the disk formats and characteristics of the virtual machine. Converts the .vmdk files to virtual hard disk files in Virtual Server (.vhd) that reside on the destination host.
VMM prepares the virtual hard disks and prepares for virtual machine creation.
7-17
7-18
Question: What are the benefits of V2V conversions? Question: What are the benefits of P2V conversions? Question: List three considerations for identifying virtualization candidates. Question: Describe how you might prioritize virtualization candidates.
For more information, see Converting VMware Virtual Machines in VMM. For more information, see Converting Physical Computers to Virtual Machines in VMM.
7-19
Key Points
Virtual machine states can be controlled from the VMM console. VMM controls VM state using the same options available in Virtual Server 2005 or Hyper-V. Consider the effect of saving VM state before using this option. Saving VM state may be more suitable for test and development environments.
Question: Would there be any undesired effects if you saved the state on a virtual machine configured as a domain controller?
7-20
Jobs
Key Points
A job is created whenever any action is performed that changes the status of a managed object in VMM. Jobs are composed of steps that are performed sequentially to complete an action. A wizard might create multiple jobs. Each job is independent. Certain jobs require credentials to complete successfully. When a job completes, an audit record is saved that lists the changes that the job made to the VMM object.
7-21
Question: How can administrators use jobs for virtual machine management?
7-22
Key Points
To help administrators make placement decisions, VMM assists in selecting appropriate hosts. VMM produces an Intelligent Placement report to help administrators select the appropriate host for a given workload. Question: What are the four factors VMM uses to rate hosts? Question: For workloads in your environment, which workload rating factors are most important?
For more information, see Microsoft System Center Virtual Machine Manager General Overview" white paper.
7-23
Reporting
Key Points
The following reports are available in VMM: Virtualization Candidates Helps identify physical computers that are good candidates for conversion to virtual machines. Virtual Machine Allocation Provides information that is used to calculate chargeback to cost centers for virtual machines. Virtual Machine Utilization Provides information about resource utilization by virtual machines. Host Utilization Shows the number of virtual machines running on each host and the average usage and total or maximum values for host processors, memory, and disk space for the specified time period and host group. Host Utilization Growth Shows the percentage of change in resource usage and the number of virtual machines running on selected hosts during a specified time period.
7-24
Question: Describe one or more scenarios when you might use these VMM reports.
7-25
7-26
Task 1: Open Virtual Machine Manager Administrator Console Task 2: Add a new host group
Add a new host group named Contoso.
7-27
7-28
7-29
7-30
7-31
7-32
Review Questions
1. 2. 3. 4. 5. 6. Why would you want to use VMM to manage virtual machines in your enterprise? What are the ways in which you can create virtual machines using VMM? When would you want to use VMM to convert a physical computer to a virtual machine? What tools are available for virtual machine management? Describe one or more scenarios from your work environment where VMM automation might be beneficial. Describe two or three ways VMM can help manage a datacenter with multiple Hyper-V hosts.
8-1
Module 8
Managing the VMM Virtual Machine Image Library and Checkpoints
Contents:
Lesson 1: Using the VMM Library Lesson 2: Managing the Image Library in VMM Lab A: Using the VMM Library Lesson 3: Managing Checkpoints Lab B: Managing Checkpoints 8-3 8-14 8-23 8-33 8-39
8-2
Module Overview
System Center Virtual Machine Manager (VMM) can be used to manage virtual machines in your organization. Features in VMM facilitate easier virtual machine management. The VMM library provides access to resources stored on library servers. With the VMM library you have a single location to store file-based resources, virtual machine templates, guest operating system profiles, and hardware profiles as well as virtual machines that are not currently in use. VMM checkpoints allow you to recover a virtual machine to a previous state. A typical use of checkpoints is to create a temporary backup before you apply update the operating system. The checkpoint enables you to restore the virtual machine to its previous state if the update fails or adversely affects the virtual machine.
8-3
Lesson 1
The VMM library is a catalog of resources used to create and configure virtual machines in the VMM console. The library contains files stored on library shares, and it contains operating system, hardware, and template configurations stored in the VMM database. Library resources are added, created, used, and managed in Library view.
8-4
Key Points
Library resources include the following: Template - The combination of a guest operating system profile, hardware profile, and one or more .vhd files. Virtual Hard Disk - A virtual machine hard disk implemented as a .vhd file. Virtual hard disks can be either fixed size or dynamically expanding. Stored Virtual Machine - A managed virtual machine whose .vhd files and other properties are stored in the Virtual Machine Manager library. ISO image - A standard CD or DVD image file. Scripts - For example, PowerShell and Sysprep scripts. VMM uses Sysprep.inf files to configure guest operating systems during virtual machine creation.
8-5
Hardware Profile - A saved collection of settings that can be used to quickly define the hardware characteristics of a virtual machine. Guest operating system profile - A saved collection of settings that provide customization of the guest operating system.
Question: In what scenarios would you store a virtual machine in the library?
8-6
Key Points
Any template includes the following primary components, whose settings define the characteristics of all virtual machines created by using a specific template: Virtual hard disk. Hardware profile components. Includes fields to specify CPU, memory, integrated device electronics (IDE) devices, SCSI adapters, and network adapters. Guest operating system components. These include fields to specify computer identity information, local Administrator password, product key, workgroup or domain.
8-7
Question: Are there scenarios when you could use templates in your organization?
8-8
Key Points
You can create a template based on an existing virtual hard disk, an existing template or an existing virtual machine that is currently deployed on a host server. You can use templates to create sets of virtual machines that share the same hardware and software configuration. In addition, you can create templates specifically for use by self-service users. Question: In what scenarios would you use each template type?
8-9
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. Question: What types of information would you store in the VMM library in your organization? Question: In what ways would utilizing the VMM library ease the administrative burden in your organization. Question: In what scenarios would templates reduce the amount of time required for administrative tasks?
8-10
Hardware Profiles
Key Points
Hardware profile specifications for a virtual machine include the following: CPU resources on the host available to a virtual machine. Memory on the host available to a virtual machine. A built-in virtual floppy drive. A built-in virtual IDE device, to which you can attach virtual DVD drives. You can also attach virtual hard disks on a virtual machine or template. You cannot attach virtual hard disks to a stand-alone hardware profile. One or more optional virtual SCSI adapters that you can add. On a virtual machine or on a template (but not on a stand-alone hardware profile), you can attach virtual hard drives to the virtual SCSI adapter.
8-11
Virtual network adapters. By default, a virtual network adapter that you add is not connected to a virtual network. Optionally, you can specify that a virtual machine created from this hardware profile be connected to an internal network or to an external network once the virtual machine is deployed on a host.
Settings that specify the priority assigned to virtual machines that are created by using this hardware profile. The priority indicates how to use the hosts CPU resources in comparison to the use of the hosts CPU by other virtual machines that are deployed on the same host.
Question: How could you assign CPU priority for different hardware profiles in your organization?
8-12
Key Points
In VMM, a guest operating system profile is a collection of operating system settings that can be imported into a virtual machine template to provide a consistent operating system configuration for virtual machines created from that template. Question: What steps would you need to plan for creating a guest operating system profile in your organization?
8-13
Question: Under what circumstances would it be beneficial to save a newly created virtual machine to the library?
8-14
Lesson 2
Virtual machine provisioning and virtual machine self-service allow administrators to control who has access to virtual machines, and the user accounts of who can perform actions of virtual machines.
8-15
Key Points
Just like in the physical data center, IT administrators rely on certain tools to help them manage the virtual data center. The VMM library stores, sorts, and catalogs all the important building blocks for the virtual data center. Distributed Libraries - For geographically disperse organizations, VMM supports the use of distributed libraries. Library Creation - Creating VMM libraries is mostly an automated exercise. Library Management - The VMM library provides 10 free-form fields for entering metadata about library assets. The files on library shares are indexed in VMM during library refreshes.
8-16
Question: How does the use of distributed libraries benefit geographically dispersed organizations?
For more information, see "Microsoft System Center Virtual Machine Manager General Overview" white paper.
8-17
Key Points
Administrators can quickly build new virtual machines from the Administrator Console through a variety of methods, including using templates and other resources found in the VMM library. 1. After selecting the appropriate template, a wizard-based flow that guides the administrator through configuration and then though the activation the virtual machine. VMM collects performance data from potential hosts and suggests the optimal hosts for the new virtual machine based on a tailored algorithm. Finally, the virtual machine is placed on the physical host.
2. 3.
8-18
VMM provides a self-service Web portal where authorized test and development staff can provision their own virtual machine resources under preset controls. Administrators control access to physical servers and can designate host groups for individuals and groups. Authorized users work from templates and manage only the virtual machines that they, or their group, own. Additionally, administrators can set quotas on resources available to users. The delegated provisioning scenario doesnt require a client on the host, and large numbers of users can be given delegated-provisioning privileges.
Question: What steps would you take to plan and implement delegated provisioning?
For more information, see "Microsoft System Center Virtual Machine Manager General Overview" white paper.
8-19
Key Points
There are several key virtual machine key features. Self-Service Policies Virtual machine self-service enables the VMM administrator to grant users permission to create and operate their own virtual machines within a controlled environment on a limited group of virtual machine hosts. Virtual Machine Permissions Virtual machine permissions set in the selfservice policy determine the actions that a user or group can take on their own virtual machines.
8-20
Virtual Machine Ownership: Under shared ownership, all members of the group own, operate, and manage virtual machines that the group created according to the virtual machine permissions set in the self-service policy. Under individual ownership, each member of the group owns and manages his own virtual machines; other group members cannot see or operate the virtual machines.
Applying Quotas to Virtual Machines For self-service users who are allowed to create their own virtual machines, you can limit the number of virtual machines that the users can deploy at one time by setting a virtual machine quota in the self-service policy. Inheritance of Self-Service Policies By creating child host groups of the host group that you use for virtual machine self-service, you can flexibly adjust a users capabilities in different contexts.
Question: In what scenarios would you use individual ownership over shared ownership?
8-21
Question: In what scenarios would it be beneficial to allow users to store virtual machines in the library? Question: In what scenarios would it be undesirable to allow users to store virtual machines in the library?
8-22
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. Question: How would you delegate virtual machine provisioning in your organization? Question: What permissions would you give to users for self-service policies? Question: What quotas would you set up for self-service policies in your organization?
8-23
8-24
4. 5. 6.
Add resources to the library share. Configure library refresh. Manually refresh library share.
8-25
8-26
8-27
Results: After this exercise, you should have created a new virtual machine named SEA-APP-01 from the Contoso Windows Server 2003 template.
8-28
8-29
8-30
8-31
8-32
Allow the users to create VMs from the Contoso Windows Server 2003 template. Set the Maximum quota points allowed to 10. On the Library Settings page, select Allow users to store virtual machines in a library. Set the Destination Folder to ContosoResources.
8-33
Lesson 3
Managing Checkpoints
VMM checkpoints allow you to recover a virtual machine to a previous state. Although checkpoints shouldnt be used for disaster recovery, checkpoints can be helpful when you upgrade software or make changes to a virtual machine. If necessary, you can use the VMM console to revert a virtual machine to a checkpoint. You also have several options for managing checkpoints in the VMM console.
8-34
VMM Checkpoints
Key Points
Checkpoints are similar to Hyper-V snapshots. Each checkpoint saves the state of each virtual hard disk that is attached to a virtual machine and all of the hard disk's contents, including application data files. By creating checkpoints for a virtual machine, you can restore the virtual machine to a previous state. The checkpoint allows you to restore the virtual machine to its previous state if the update fails or adversely affects the virtual machine. You can create as many as 64 checkpoints for any one virtual machine. Checkpoints are portable. When a virtual machine is migrated, stored, or deployed, any existing checkpoints move with the virtual machine.
8-35
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. Question: Should checkpoints be used as backups? Question: How would you back up your VMM data? Question: What do you need to protect your VMM data?
8-36
Using Checkpoints
Key Points
There are several options available for managing checkpoints in VMM: create, edit, delete and restore. Create a Checkpoint Checkpoints can only be created when a virtual machine is deployed on a host. Checkpoints cannot be created when a virtual machine is stored in the library. You can create a checkpoint by using the New checkpoint action for a selected virtual machine, or you can create and manage checkpoints while updating the properties of a virtual machine.
Edit a Checkpoint A checkpoint can be edited in the Manage Checkpoints dialog box.
8-37
Delete a Checkpoint If a virtual machine is running on Hyper-V or VMware virtualization software, deleting a checkpoint deletes the reference without merging state. The virtual machine can no longer be restored to the checkpoint that was deleted. However, the virtual machine can still be restored to any other checkpoint, whether it was saved before or after the deleted checkpoint.
Restore a Virtual Machine to a Checkpoint Use the Restore action to restore a virtual machine to its state when a checkpoint was created.
Question: What are some precautions to take before you create a checkpoint on a virtual machine?
8-38
8-39
8-40
8-41
2.
9-1
Module 9
Windows PowerShell and Disaster Recovery
Contents:
Lesson 1: Using PowerShell to Manage Hyper-V Lab A: Using PowerShell with VMM Lesson 2: Virtual Machine Backup and Recovery Lab B: Creating Backups 9-3 9-21 9-31 9-37
9-2
Module Overview
Microsoft System Center Virtual Machine Manager 2008 is a tool for managing virtual machines running on Microsoft Windows Server 2008 with Hyper-V. The System Center Virtual Machine Manager (VMM) command shell is built on Microsoft Windows PowerShell, an administrator-focused, interactive commandline shell and scripting language that is integrated into the Windows operating system. Disaster recovery is important whether you have physical machines or virtual machines. There are several methods to backup virtual machines, including Windows Server Backup.
9-3
Lesson 1
Windows PowerShell and VMM each provide commands, called cmdlets, that you can use separately to perform simple administrative tasks or together with other cmdlets or command-line elements to perform complex tasks. You can use VMM cmdlets and scripts that are created by using these cmdlets as an alternative to, or in addition to, using the Administrator Console for centralized management of your physical and virtual system infrastructure.
9-4
PowerShell Overview
Key Points
PowerShell has object-oriented data handling, can incorporate pipelining of data, and requires scripts to be digitally signed. Question: How can pipelining be useful when working with PowerShell?
For more information, see "Windows PowerShell Owner's Manual." For more information, see "Windows PowerShell: Simple Commands. Powerful Administration."
9-5
Key Points
Some benefits of using PowerShell include its power, simplicity, and safety features. Question: In what ways can these benefits be realized in your organization?
For more information, see "Windows PowerShell Owner's Manual." For more information, see "Windows PowerShell: Simple Commands."
9-6
Key Points
For even greater automation and control, System Center Virtual Machine Manager 2008 (VMM) is fully scriptable using Windows PowerShell. The VMM console interface is layered on top of the Windows PowerShell objects, so that every Wizard action can show the associated command-line script. The Summary page of each wizard contains a View Script button that displays the Windows PowerShell cmdlets that the wizard will use to create and configure the new object based on your specifications. If you store your Windows PowerShell scripts in the VMM library, you can view, edit, or run the scripts in Library view. One administrator can create powerful scripts that others can use. Scripts are stored in a centralized location. Delegation model provides control of who has access.
9-7
For more information, see Help Topic: "Using the Windows PowerShell VMM Command Shell." For more information, see Help Topic: "Viewing, Editing, and Running PowerShell Scripts from the Library."
9-8
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. What is your experience with PowerShell? What is your experience with other scripting languages? How interested are you in learning about how to use PowerShell?
9-9
Key Points
Windows PowerShell and VMM each provide commands called cmdlets, that you can use separately to perform simple administrative tasks or together with other cmdlets or command-line elements to perform complex tasks. The VMM command shell includes all of the standard Windows PowerShell cmdlets and also provides a comprehensive set of cmdlets that are designed specifically for use with VMM. You can use these cmdlets to manage all functions in a VMM environment, including the following tasks: Adding and working with virtual machine hosts and host groups Adding the VMM library and maintaining the resources that it stores Creating and working with virtual machines that are deployed on a host or stored in the library Managing the virtual machine environment Creating virtual machine checkpoints
9-10
Backing up the VMM database Administering the virtual machine self-service feature
For more information, see "Appendix A: About Windows PowerShell for Virtual Machine Manager."
9-11
For more information, see "Appendix A: About Windows PowerShell for Virtual Machine Manager." For more information, see "Appendix B: Introductory Command-Line Tutorial."
9-12
Key Points
The VMM Administrator Console is built on Windows PowerShell. The following synopsis of the standard call sequence for any hypothetical Administrator Console operation illustrates the integration of Windows PowerShell and the Administrator Console: 1. 2. 3. 4. The Administrator Console makes a call to a Windows PowerShell cmdlet. The Windows PowerShell cmdlet makes a Windows Communication Foundation call to the VMM server service. VMM initiates a job if the operation changes state or is long-running and, therefore, needs to be audited or monitored asynchronously. VMM makes SQL Server calls, as necessary, to read and update the VMM database.
9-13
5.
VMM makes Windows Remote Management (WinRM) calls, as necessary, to access remote hosts on which virtual machines are deployed or to access remote library servers on which VMM library resources are stored. WinRM calls, in turn, access Windows Management Instrumentation (WMI) methods on VMM hosts or library servers. These WMI methods ship either in the operating system or as part of the VMM agent service.
6.
All operations that you perform by using the Administrator Console in VMM are actually performing these tasks. Question: Describe one or more scenarios in which you might directly use cmdlets in your organization.
For more information, see "Appendix A: About Windows PowerShell for Virtual Machine Manager."
9-14
Key Points
Objects represent all entities in VMM: Each of the objects that Windows PowerShell for VMM uses is an instance of a .NET Framework class, which consists of data and operations that are associated with that data. An object is not the same as the entity that the object represents. You can use the standard Windows PowerShell cmdlet, Get-Member, to view the properties and methods of any object. You can use VMM cmdlets to manage all VMM objects at the command line. VMM objects differ from standard Windows PowerShell objects because all VMM objects are live and thus are kept synchronized with each other. Standard Windows PowerShell objects typically are not synchronized.
9-15
Question: List one or more differences between an object and an instance of that object.
For more information, see "Appendix A: About Windows PowerShell for Virtual Machine Manager."
9-16
Key Points
Using WMI with VMM provides administrators with more options. VMM uses Windows Management Instrumentation (WMI) for cross-product scripting. WMI is the Microsoft implementation of Web-Based Enterprise Management (WBEM), an industry-wide standard technology for accessing information about components of Windows-based computers in an enterprise environment. A WMI interface provides programmatic access to a system, enabling users to write command-line administration scripts and tools. This enables network administrators to collect and set configuration details on a wide variety of hardware, operating system components and subsystems, and application software.
9-17
WMI does not consolidate the management data in a central location; System Center Configuration Manager 2007 (SCCM) performs this function. Configuration Manager provides inventory collection, software deployment, and diagnostic tools; automates software upgrades; enables remote problem solving; provides asset management information; and monitors software usage, computers, and networks. This facilitates the management of multiple servers as a single system to increase availability and manageability of data and applications.
Key WMI Components Key WMI components include managed objects and WMI providers. WMI infrastructure The WMI infrastructure is a Microsoft Windows operating system component. The WMI infrastructure has two components: the WMI service (winmgmt), including the WMI Core, and the WMI repository. The WMI repository is organized by WMI namespace. The WMI service acts as an intermediary between the providers, management applications, and the WMI repository.
WMI consumers A WMI consumer is a management application or script that interacts with the WMI infrastructure.
For more information, see "Getting Started with PowerShell Scripting for VMM." For more information, see "Accessing WMI From Windows PowerShell." For more information, see "WMI Architecture."
9-18
Key Points
PowerShell can be used to manage Hyper-V. The primary cmdlet that will be used in PowerShell to access the virtualization WMI space is Get-WmiObject. Every time you access the virtualization WMI space, you begin the same way. To access the Virtualization WMI space you would first type GetWMIObject namespace root\virtualization. Then you access the class -class Msvm_Computer System. The physical computer and its hosted virtual machines are each represented by the ComputerSystem class. Then you need to address the Hyper-V parent, although this is not necessary if you are working on the local Hyper-V machine. You would type -computername localhost.
9-19
Question: What would be the advantage of accessing the Hyper-V interface remotely on a Windows Server 2008 Server Core server?
9-20
Key Points
There are four types of execution policies: restricted, allsigned, remotesigned and unsigned. The PowerShell extensions are .ps1, .psc1, and .ps1xml.
Question: Which execution policy would you use in a test environment? Why? Question: Which execution policy would you use in a production environment? Why?
For more information, see "Getting Started with PowerShell Scripting for VMM."
9-21
9-22
Task 1: Open the VMM command shell from the Start menu
The VMM Command Shell is located at Start | All Programs | Microsoft System Center | Virtual Machine Manager 2008 | Windows PowerShell Virtual Machine Manager.
9-23
9-24
9-25
Note: In PowerShell the $ symbol signifies a variable. In this example, you are storing the output in the VMMServer variable.
Task 6: Start a VM
Start SEA-SRV-02 using the start-vm cmdlet.
9-26
Note: There may not be any failed jobs listed. The command will complete successfully if you don't receive any errors.
9-27
9-28
Note: This is a not a secure setting and should only be used in testing scenarios.
9-29
9-30
9-31
Lesson 2
Planning for disaster recovery is important, especially with production virtual machines. There are several methods for backing up virtual machines including System Center Data Protection Manager and Windows Server Backup.
9-32
Key Points
Discuss the questions in a classroom discussion, led by your instructor, and determine the answers. What are some best practices for designing a backup and restore strategy? What should your backup and restore strategy include? What are the components of Hyper-V and VMM that must be backed up to meet your disaster recovery needs?
9-33
Key Points
Backing up virtual machines is an important step in disaster recovery. Hyper-V now supports volume shadow copy services (VSS), an automated backup feature that enables point-in-time backups of running virtual machines without any interruption. Combined with System Center Data Protection Manager (DPM) or other similar backup technologies from Microsoft partners, you can now take these snapshot backups and enable the data to be stored in secure locations, even offsite locations, for when it's needed.
9-34
Question: Describe some considerations for deciding whether to back up the contents of a VM or the entire VM.
For more information, see "Protect your Virtual Environment." For more information, see "What is Volume Shadow Copy Service."
9-35
Key Points
Back up all configuration and resource files - You can backup virtual machines by using file backup software on the host operating system. You can use Windows Backup or another method. Back up running virtual machines- You can back up a running virtual machine in the same manner as a physical computer by installing backup software on the guest operating system and performing the backup. If your organization has a standard backup process for physical computers, you can use the same process for your virtual machines. Restoring using these methods - Restoring Hyper-V involves reinstalling Hyper-V and copying the backed up files into the appropriate locations in the file system.
9-36
Question: In what scenarios would you use each of these backup methods?
For more information, see "How to back up virtual machines in Virtual Server 2005." For more information, see "Backing up and restoring Virtual Server."
9-37
9-38
Note: The process may take 20 minutes. You may click Close if you are short on time.
Results: After this exercise, you should have scheduled a backup using the Backup Once Wizard.
9-39
Review Questions
1. 2. 3. 4. You try to list all cmdlets for VMM; however, you don't receive any results? Why might this happen? Why is the unrestricted execution policy not secure? You want to add a new VMM host named Hyper-V-2.contoso.com with PowerShell. What command would you use? You want to get detailed information about the remove-template cmdlet and store it in a text file. How would you do this?
9-40
Course Evaluation
Your evaluation of this course will help Microsoft understand the quality of your learning experience. Please work with your training provider to access the course evaluation form. Microsoft will keep your answers to this survey private and confidential and will use your responses to improve your future learning experience. Your open and honest feedback is valuable and appreciated.
L1-1
3. 4. 5. 6. 7. 8. 9.
10. On the Confirm Installation Selections page, click Install. 11. On the Installation Results page, click Close. 12. The Add Roles Wizard dialog box appears. Click Yes. 13. After the server restarts, log on as the domain administrator. 14. The Resume Configuration Wizard appears. Review the messages, and then click Close.
Results: After this exercise, you should have successfully installed the Hyper-V role.
L1-2
10. In the Actions pane, click Virtual Network Manager. 11. The Virtual Network Manager dialog box appears. Review the settings for Virtual Networks. Click Cancel. 12. In the Actions pane, click New. Review the wizards for creating Virtual Machine, Hard Disk and Floppy Disk. 13. In the Actions pane, click Import Virtual Machine. You can only import Virtual Machines that have been created and exported in Hyper-V. 14. The Imported Virtual Machines dialog box appears. In the Import Path field, type E:\Mod01\Labfiles\SEA-SQL-01, and then click Import. 15. In Virtual Machines pane, click SEA-SQL-01. 16. In the Actions pane, click Start, and then click Connect. 17. The SEA-SQL-01 on 6422-Hyper-V Virtual Machine Connection window opens. Explore the menu and toolbar options. Experiment with working on the virtual machine. When finished, close this window.
Results: After this exercise, you should have become familiar with Hyper V Manager.
L2-3
10. On the Configure Networking page, in the Connection list, click the Virtual Network Adapter. Click Next. 11. On the Connect Virtual Hard Disk page, click Next. 12. On the Installation Options page, click Next. 13. On the Completing the New Virtual Machine Wizard page, click Finish. 14. In the Virtual Machines pane, click SEA-SQL-02. 15. In the Actions pane, under SEA-SQL-02, click Settings.
L2-4
16. The Settings for SEA-SQL-02 dialog box appears. In the left pane, under Hardware, click Memory. In the Memory field, type 512. 17. In the left pane, click Processor. In the Number of logical processors list, click 2. 18. Review the settings under Resource control. Review the information available through the More about resource control link. Click OK.
Results: After this exercise, you will have successfully configured the Hyper-V Server Settings and created a new virtual machine.
L2-5
10. If the Apply Networking Changes dialog box appears, click Yes. 11. In the left pane, click New virtual network. 12. In the right pane, click Private, and then click Add. 13. In the Name field, type Isolated. 14. Under Connection type, click Private virtual machine network. Click OK. 15. If the Apply Networking Changes dialog box appears, click Yes. 16. In the Virtual Machines pane, click SEA-SQL-02. 17. In the Actions pane, under SEA-SQL-02, click Settings. 18. The Settings for SEA-SQL-02 dialog box appears. In the left pane, under Hardware, click Network Adapter. 19. In the right pane, in the Network list, click Test Environment. 20. Review the additional settings available, and then click OK.
Results: After this exercise, you will have configured Hyper-V Virtual Network Settings
L3-7
L3-8
10. Double-click Hyper-V Management Clients - WMI (Async-In). Review the settings, and then click Cancel. 11. Double-click Hyper-V Management Clients - WMI (DCOM-In). Review the settings, and then click Cancel. 12. Double-click Hyper-V Management Clients - WMI (TCP-In). Review the settings, and then click Cancel. 13. In the console tree, click Outbound Rules. 14. In the details pane, double-click Hyper-V - WMI (TCP-Out). Review the settings, and then click Cancel. 15. Double-click Hyper-V Management Clients - WMI (TCP-Out). Review the settings, and then click Cancel. 16. Close Windows Firewall with Advanced Security.
Results: After this exercise, you should have reviewed the Windows Firewall with Advanced Security settings for remotely managing Hyper-V.
L3-9
10. The Download and Install Updates dialog box appears. When installation completes, click Close.
Results: After this exercise, you should have installed the Hyper-V Manager on Windows Vista.
L3-10
10. Review the message in the Virtual Machines pane. In order to manage Hyper-V remotely, you must connect using a domain user account that has permissions to manage the Hyper-V server. 11. In the SEA-WRK-001 on localhost window, click the Shutdown toolbar button. 12. The Shut Down Machine dialog box appears. Click Shut Down. 13. After the operating system shuts down, close SEA-WRK-001 on localhost.
Results: After this exercise, you should have connecting to the Hyper-V server remotely.
L4-11
10. In the Size field, type 250, and then click Next. 11. On the Completing the New Virtual Hard Disk Wizard page, review the settings, and then click Finish. 12. On the Start menu, click Computer. 13. Navigate to E:\Hyper-V\Virtual Hard Disks. Verify the SEA-WEB-01.vhd file exists and note the size of the file.
L4-12
Task 3: Creating a new virtual hard drive from a physical hard drive
1. 2. 3. 4. 5. 6. 7. 8. 9. Restore Hyper-V Manager. In the Actions pane, click New | Hard Disk. The New Virtual Hard Disk Wizard appears. Click Next. On the Choose Disk Type page, click Next. On the Specify Name and Location page, in the Name field, type SEA-HyperV-01.vhd. Click Next. On the Configure Disk page, click Copy the contents of the specified physical disk. Restore Server Manager. In the console tree, expand Storage, and then click Disk Management. In the details pane, verify that the C:\ drive is on Disk 0.
L4-13
10. Minimize Server Manager. 11. In the Physical Hard Disk list, click \\.\PHYSICALDRIVE0. Click Next. 12. On the Completing the New Virtual Hard Disk Wizard page, review the settings, and then click Finish. 13. Restore Windows Explorer. 14. Verify the SEA-Hyper-V.vhd file exists and note the size of the file. It may take several minutes for the physical hard drive to be replicated to the Virtual Hard Disk (VHD) file. Press F5 to refresh as necessary. Depending on the size of physical drive, this process may take hours to complete. 15. Minimize Windows Explorer. 16. In the Creating the new virtual hard disk dialog box, click Cancel. 17. The New Virtual Hard Disk Wizard dialog box appears. Click Close, and then click Cancel.
Results: After this exercise, you should have 3 VHD files. Cancel the creation of SEAHyper-V-01.vhd creation.
L4-14
10. Click Next. 11. On the Completing the New Virtual Machine Wizard page, review the settings. 12. Click Finish.
L4-15
L4-16
Task 4: Connect to the Virtual Machine and install Windows Server 2008
1. 2. 3. 4. In the Virtual Machines pane, click SEA-WEB-01. In the Actions pane, click Start. In the Actions pane, click Connect. The Virtual Machine may be unable to capture the mouse until the Hyper-V Integration Services are installed. If this is the case, use the keyboard to start the Windows Server 2008 installation. The SEA-WEB-01 on 6422-Hyper-V Virtual Machine Connection window opens. When the Install Windows wizard appears, press ENTER twice. On the Type your product key for activation page, click Next. The Install Windows dialog box appears. Review the message, and then click No. On the Select the edition of Windows that you purchased page, click Windows Server 2008 Enterprise (Server Core Installation). Select I have selected the edition of Windows that I purchased, and then click Next.
5. 6. 7. 8. 9.
10. On the Please read the license terms page, select I accept the license terms, and then click Next. 11. On the Which type of installation do you want page, click Custom (advanced). 12. On the Where do you want to install Windows page, click Next. The installation will now complete. 13. Close SEA-WEB-01 on localhost.
Results: After this exercise, you should have one virtual machine created from the previous exercises VHDs, and Windows Server 2008 installing on the VM.
L5-17
10. In the left pane, under Management, click Automatic Start Action. 11. In the right pane, click Always start this virtual machine automatically. 12. In the left pane, under Management, click Automatic Stop Action. 13. In the details pane, review the settings. 14. Click OK. 15. In the Virtual Machines pane, click SEA-SQL-01. 16. In the Action pane, under SEA-SQL-01, click Settings. 17. The Settings for SEA-SQL-01 dialog box appears. In the left pane, under Hardware, click Processor. 18. In the Virtual machine reserve (percentage) field, type 20. 19. In the Virtual machine limit (percentage) field, type 80.
L5-18
20. In the Relative weight field, type 50. 21. Click Apply 22. In the left pane, under Management, click Automatic Start Action. 23. In the right pane, click Always start this virtual machine automatically. 24. In the left pane, under Management, click Automatic Stop Action. 25. In the right pane, click Shut down the guest operating system. 26. Click OK.
10. In the left pane, under Management, click Automatic Stop Action. 11. In the right pane, click Turn off the virtual machine. 12. Click OK.
Results: After this exercise, you will have successfully configured the VM settings for the virtual machines.
L5-19
10. Click Virtual Processors, and then click Add >>. 11. Expand Hyper-V Hypervisor Logical Processor. 12. Click % Guest Run Time, and then click Add >>. 13. Click % Hypervisor Run Time, and then click Add >>. 14. Click % Total Run Time, and then click Add >>. 15. Click OK.
L5-20
10. Restore Reliability and Performance Monitor. 11. Review the graph. 12. Click the Change Graph Type toolbar button (or press CTRL+G) to alternate the type of graphs.
Results: After this exercise, you will have experience with the new Hyper-V performance monitor counters.
L6-21
L6-22
10. In the Actions pane, click New | Virtual Machine. 11. The New Virtual Machine Wizard appears. Click Next. 12. On the Specify Name and Location page, in the Name field, type SEA-SRV-02. Click Next. 13. On the Assign Memory page, in the Memory field, type 256. Click Next twice. 14. On the Connect Virtual Hard Disk page, click Use an existing virtual hard disk. 15. The Open dialog box appears. Double-click WS03 NoVMAdd.vhd. 16. Click Finish. 17. In the Virtual Machines pane, click SEA-WEB-01, and then press CTRL+click SEA-WRK-001. 18. In the Actions pane, click Shut Down. 19. In the Virtual Machines pane, click SEA-SRV-01, and then press CTRL+click SEA-SRV-02. 20. In the Actions pane, click Start.
Results: After this exercise, you should have two virtual machines created. One will have the VM Additions still installed and the other will not.
L6-23
10. The New Hardware Wizard dialog box appears. Click Cancel. 11. Press RIGHTALT+LEFT ARROW to release the mouse. 12. On the Action menu, click Insert Integration Services Setup Disk. 13. The Virtual Machine Additions Detected dialog box appears. Review the message, and then click OK. 14. On the Start menu, click Control Panel | Add or Remove Programs. 15. The Add or Remove Programs window opens. Click Virtual Machine Additions, and then click Remove. 16. The Add or Remove Programs dialog box appears. Click Yes. 17. The Virtual Machine Additions dialog box appears. Click Yes.
L6-24
18. When the virtual machine reboots, log on as Administrator. In the Password field, type Pa$$word. 19. If the Service Manager dialog box appears, click OK. 20. The Windows Protection Activation dialog box appears. Click No. 21. The New Hardware Wizard dialog box appears. Click Cancel. 22. On the desktop, double-click My Computer. 23. Double-click Integration Services Setup (D:). 24. The HAL Upgrade Required dialog box appears. Review the message, and then click OK. 25. The Restart Required dialog box appears. Click Yes. 26. When the virtual machine restarts, log on as Administrator. In the Password field, type Pa$$w0rd. 27. The Windows Protection Activation dialog box appears. Click No. 28. The New Hardware Wizard dialog box appears. Click Cancel. 29. The Hyper-V Integration Services dialog box appears. This process may take several minutes to complete. 30. The Files Needed dialog box appears. In the Copy files from field, type C:\Win2k3\I386, and then click OK. 31. The Installation Complete dialog box appears. Review the message, and then click Yes. 32. When the virtual machine reboots, log on as Administrator. In the Password field, type Pa$$w0rd. 33. The Windows Protection Activation dialog box appears. Click No. 34. The Virtual Machine is now ready for use on the Hyper-V server. 35. Close the SEA-SRV-01 on localhost Virtual Machine Connection window.
L6-25
10. Press CTRL+ALT+LEFT ARROW. In the SEA-SRV-02 on localhost window, on the Action menu, click Insert Integration Services Setup Disk. 11. The HAL Upgrade Required dialog box appears. Review the message, and then click OK. 12. The Restart Required dialog box appears. Review the message, and then click OK. 13. When the virtual machine restarts, log on as Administrator. In the Password field, type Pa$$w0rd. 14. If the Service Manager dialog box appears, click OK. 15. The Windows Protection Activation dialog box appears. Click No. 16. The New Hardware Wizard dialog box appears. Click Cancel. 17. The Files Needed dialog box appears. In the Copy files from field, type C:\Win2k3\I386, and then click OK.
L6-26
18. The Installation Complete dialog box appears. Review the message, and then click Yes. 19. When the virtual machine restarts, log on as Administrator. In the Password field, type Pa$$w0rd. 20. The Windows Protection Activation dialog box appears. Click No. 21. The Virtual Machine is now ready for use on the Hyper-V server. 22. Close the SEA-SRV-02 on localhost Virtual Machine Connection window.
Results: After this exercise, you should have two virtual machines working with HyperV Integration Services installed.
L7-27
2.
L7-28
6. 7. 8. 9.
On the Configuration Settings page, in the Add the selected new hosts to the following host group list, expand All Hosts, and then click Contoso. Click Next. On the Host Properties page, in the Add the following paths field, type E:\Hyper-V. Click Add, and then click Next. On the Summary page, click Add Hosts.
10. The Jobs window opens. Maximize the window. Review the status and description of each job. When the jobs finish, close the Jobs window. 11. In the details pane, under 6422-Hyper-V##.Contoso.com, review the CPU, Memory, Storage, Operating system, Virtualization software, and Virtual machines information. It may take several minutes for this information to populate.
Results: After this exercise, you should have added 6422-Hyper-V to the Contoso host group in the Virtual Machine Manager Administrator Console.
L7-29
L7-30
Results: After this exercise, you should have created a network named VMM Network.
L7-31
10. Click Next. 11. On the Select Destination page, review the options, and then click Next. 12. On the Select Host page, click 6422-Hyper-V##.Contoso.com. 13. Review the tabs under Details, and then click Next. 14. On the Select Path page, click Next. 15. On the Select Networks page, in the Virtual Network list, click Internal Network-VMM Network. 16. Click Next.
L7-32
17. On the Additional Properties page, in the Action when physical server stops list, click Shut down guest OS. 18. Under Operating system, in the Specify the operating system you will install in the virtual machine list, review the available options. Click Windows Server 2003 Enterprise x64 Edition. 19. Click Next. 20. On the Summary page, click Create. 21. The Jobs window opens. Review the jobs required to create the virtual machine. When all the jobs complete, close the Jobs window.
Results: After this exercise, you should have created a new virtual machine named LON-DC-01.
L7-33
10. Click Next. 11. On the Additional Properties page, click Next. 12. On the Summary page, click Create. 13. The Jobs window opens. Review the jobs required to create the virtual machine. When all the jobs complete, close the Jobs window.
Results: After this exercise, you should have created a new virtual machine named LON-DC-02.
L7-34
L7-35
10. On the Additional Properties page, click Next. 11. On the Summary Page, click Create. 12. The Jobs window opens. Review the jobs required to create the virtual machine. When all the jobs complete, close the Jobs window.
Results: After this exercise, you should have converted LON-EX-01 to a VMM compatible format.
L7-36
L8-37
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
L8-38
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
L8-39
10. On the Guest Operating System page, under Networking, click Domain / Workgroup. 11. Click Domain. 12. In the Domain field, type Contoso. 13. In the Domain user field, type contoso\administrator. 14. In the Password and Confirm fields, type Pa$$w0rd. 15. Under General Settings, click Admin Password. 16. In the Password and Confirm fields, type Pa$$w0rd. 17. Click Next. 18. On the Select Library Server page, click Next. 19. On the Select path page, click Browse.
L8-40
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
20. The Select Destination Folder dialog box appears. Click ContosoResources, and then click OK. 21. Click Next. 22. On the Summary page, click Create. 23. In the left pane, click Jobs. 24. In the details pane, click Create template. 25. Click the Details tab, and then review the steps and status of the template creation. When the job completes, continue with the next task.
10. Click Admin Password. 11. In the User name field, type Admin. 12. Click Product Key. 13. In the Product Key field, type XXXXX-XXXXX-XXXXX-XXXXX-XXXXX. 14. Click Next. 15. On the Select Destination page, click Next.
L8-41
16. On the Select Host page, click Next. 17. On the Select Path page, click Next. 18. On the Select Networks page, click Next. 19. On the Additional Properties page, click Next. 20. On the Summary page, click Create. 21. The Jobs window opens. Click Create virtual machine. 22. Review the steps and status of the virtual machine creation. Continue with the next exercise as this process completes in the background.
Results: After this exercise, you should have created a new virtual machine named SEA-APP-01 from the Contoso Windows Server 2003 template.
L8-42
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
L8-43
L8-44
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
10. On the Select path page, click Browse. 11. The Select Destination Folder dialog box appears. Click ContosoResources, and then click OK. 12. Click Next. 13. On the Summary page, click Create.
L8-45
4. 5. 6. 7. 8. 9.
L8-46
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
10. Click Next. 11. On the Select Scope page, select Contoso, and then click Next. 12. On the Virtual Machine Permissions page, click Only selected actions. 13. Clear the check boxes for Remove, Remote connection and Shutdown.
Note: The following should be selected: Start, Stop, Pause and resume, Checkpoint, Local administrator.
L8-47
14. Click Next. 15. On the Virtual Machine Creation Settings page, select Allow users to create new virtual machines. 16. Click Add. 17. The Select a Template dialog box appears. Click Contoso Windows Server 2003, and then click OK. 18. Select Set quota for deployed virtual machines. 19. In the Maximum quota points allowed field, type 10. 20. Click Next. 21. On the Library Share page, select Allow users to store virtual machines in a library. 22. Click Browse. 23. The Select Destination Folder dialog box appears. Click ContosoResources, and then click OK. 24. Click Next. 25. On the Summary page, click Create.
L8-48
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
L8-49
L8-50
Module 8: Managing the VMM Virtual Machine Image Library and Checkpoints
L9-51
2.
L9-52
L9-53
L9-54
Note: In PowerShell the $ symbol signifies a variable. In this example, you are storing the output in the VMMServer variable.
2.
L9-55
Task 6: Start a VM
Type start-vm vm SEA-SRV-02, and then press ENTER.
Note: There may not be any failed jobs listed. The command will complete successfully if you dont receive any errors.
L9-56
10. The Add Library Share wizard appears. Select NewLibrary, and then click Next.
L9-57
Note: This is a not a secure setting and should only be used in testing scenarios.
L9-58
L9-59