Archive for System Center

SCE 2010 RTM install with SQL 2008 R2 on Hyper-V

 

First things first.. the pre-reqs:

A database! – SQL 2008 R2, but which version..? – this should help, SQL 2008 R2 Features and Comparisons http://msdn.microsoft.com/en-us/library/cc645993(SQL.105).aspx

Arrrggggghhhhh!

Leave a Comment

Infrastructure Optimisation… where to start!?!?

This week I’m in the US working with a customers data center platform systems and doing some IO (Infrastructure Optimisation) activities.

IO has been around for a while as a Microsoft branded activity – see http://www.microsoft.com/io for a wealth of information on the IO optimization model and how to move up the stack.

However, before can start an IO improvements program you sometimes have to go right back to basics!

Leave a Comment

New Microsoft management software on-route, clear-out the old beta’s

With the release of SCE2010 Release Candidate this last week, and coupled with a rebuild of our primary infrastructure & management server it’s been time to do a bit of overdue housekeeping in light of the new software available or about to be released..

This morning (whilst finishing our new Windows 7 with Office 2010 Beta build for the ThinkPad X series – yes I’m a sad git at 07:00!) I’ve deleted space consuming binaries and install media for older beta products that have been superceeded or are about to be.

For the cull are SCE2010 Beta, DPM 2010 Beta v3 (RC is due in early feb), and a really old SCVMM 2008 R2 RC…. saved a mere 26GB of disk space there! (yes this is sarcasm!)

Now I’m not intending to write possibly the most pointless and dull blog post in the history of the blaahhhg, but more as a reference to myself of our involvement in these stages of product testing and development.

If for some reason you’re not aware of how you get hold of Microsoft early release beta’s and release candidates then take a trip to http://connect.microsoft.com.  Be warned this may start a long and time consuming passtime of exploring new software, but the rewards are there for your efforts.

Anyway, its time to start reusing some of that reclaimed disk space and start extracting the 4.10GB of SCE2010 RC I downloaded the other day… who’s going to bet its even bigger than the beta? 😉

Leave a Comment

Training – Accelerated Implementing & Managing Windows Server 2008 Hyper-V and SCVMM

44CO134 – Server Virtualisation Competency Fast Track: Implementing and Managing Windows Server 2008 Hyper-V and SCVMM

Summary:
This course combines the syllabus of Microsoft courses 6422 and 6331 providing delegates with the knowledge to take Exams 70-652 and 70-403 which can lead to the new Server Virtualisation Competency.

This combined four day course teaches students how to implement and manage Windows Server 2008 Hyper-V. It also teaches students how to manage Hyper-V with System Center Virtual Machine Manager (VMM) and with PowerShell. The course then goes on to teach students how to implement a Microsoft System Center Virtual Machine Manager V2 solution in an organization. The course also discusses how to install, configure, and deploy VMM.

Prerequisites:
Windows Server 2000/2003 System Administration

Basic understanding of System Center Virtual Machine Manager (VMM) (optional)

Server Virtualization using Virtual Server 2005, Virtual PC, or VMWare

Operating knowledge of System Center Operations Manager 2007

Objectives:
Delegates will learn how to
Install and configure Windows Server 2008 Hyper-V.
Understand Hyper-V Virtual Networking.
Understand the types of Virtual Hard Drives and their benefits.
Create and manage Virtual Machines on the Hyper-V server.
Understand how to configure the Hyper-V server to ensure high availability.
Monitor the performance of the Hyper-V server.
Understand how to use existing virtual machines in the Hyper-V server.
Understand the issues with migrating existing Virtual Machines to Hyper-V.
Understand how System Center Virtual Machine Manager (VMM) can be used to manage Hyper-V servers throughout the enterprise.
Use PowerShell to manage the Hyper-V server and the virtual machines hosted on the Hyper-V server.
Implement a disaster recovery plan for Virtual Machines on Hyper-V.
Identify installation prerequisites and requirements for VMM, select secure settings for VMM installations; and install VMM management packs.
Describe prerequisites for installing the Administrator Console; configure the Windows Firewall for the VMM Administrator Console; and configure managed hosts.
Describe prerequisites for the VMM Self-Service Portal; configure IIS to support the Self-Service Portal; and install the Self-Service Portal.
Configure host server hardware to support VMs.
Add VM hosts to VMM; install the VMM agent; add VMWare servers to VMM; and create filters.
Configure delegated administration; set host or group permissions; and configure VMM settings to support a test environment.
Configure access to the VMM Self-Service Portal; configure quotas on the VMM Self-Service Portal; and self-provision VMs using the VMM Self-Service Portal.
Add a VMM library including library shares and library servers and manage the contents of VMM library shares.
Deploy VMs using multiple methods; and use Intelligent Placement to deploy VMs.
Identify considerations for SAN VM migrations; perform a Quick Migration; and use Intelligent Placement to move a VM.
Convert a physical computer to a VM.
Convert other VM formats to Hyper-V VMs using VMM.
Describe considerations for configuring host clustering and describe procedures for configuring host clustering.
Describe considerations for configuring guest clustering and describe procedures for configuring guest clustering.
Identify scenarios where VMM Checkpoints may be used to meet operational requirements and create a VM Checkpoint.
Describe considerations for patch management using System Center Configuration Manager (SCCM) and deploy patches using WSUS.
Describe and configure SCOM reporting.
Use SCOM to select potential virtualization targets based on workload and performance characteristics.
Describe considerations for monitoring host server utilization; measure and analyze host server utilization; and identify important considerations in growth planning.
Monitor and manage the progress of VMM jobs.
Locate failed jobs and recover failed jobs.

Agenda:
Course outline
M6422
Module 1: Introduction to Windows Server 2008 Hyper-V
This module introduces the concepts related to and the history of server virtualization. Through this module, the student will understand the business need for virtualization and how virtualization fits into their existing environment. Selecting the required hardware and basic installation and configuration are also covered.
Introducing Windows Server 2008 Hyper-V
Hyper-V Requirements
Installing the Hyper-V Server Role
Configure Hyper-V to Be Highly Available
Lab : Install Hyper-V and Perform Initial Configuration (Install Hyper-V; Explore the Hyper-V Management Console)
Module 2: Configure Hyper-V Settings and Virtual Networks
This module provides information on the configuration options available on the Hyper-V server and the Hyper-V Virtual Networks.
Configuring Hyper-V Options
Configuring the Virtual Network
Lab : Configuring Hyper-V and Virtual Networks (Configure Hyper-V Server Settings; Configure Hyper-V Virtual Networks)
Module 3: Hyper-V Remote Administration
This module explores the requirements for remote management of the Hyper-V Server and the tools available for remote management.
Configuring Hyper-V Remote Administration
Connecting to Hyper-V Remotely
Lab : Accessing and Managing Hyper-V Remotely (Configure the Windows Firewall; Install the Hyper-V Manager on Windows Vista; Connect to the Hyper-V Server Remotely)
Module 4: Creation of Virtual Hard Drives and Virtual Machines
This module explores the creation of the Hyper-V Virtual Machines and their associated Virtual Hard Drives. The options available for the Virtual Machines and the types of Virtual Hard Drives will be covered. This module also covers the importance of Hyper-V Integration Services and Hypervisor.
Creating Virtual Hard Drives
Creating Virtual Machines
Lab : Creating Virtual Hard Drives and Virtual Machines (Creating New Virtual Hard Disks; Creating New Virtual Machines)
Module 5: Virtual Machine Settings, Snapshots, and High Availability
This module explores the settings available on each Virtual Machines hosted on the Hyper-V server and how to use and manage Virtual Machine snapshots. The module will also cover configuring Hyper-V for high availability and performance monitoring on the Hyper-V server.
Managing Virtual Machine Settings
Using Virtual Machine Snapshots
Configuring Hyper-V for High Availability
Monitoring Hyper-V Performance
Lab : Managing Virtual Machine Settings (Configure Virtual Machine Settings; Monitor Hyper-V Performance)
Module 6: Migration of Virtual Machines to Hyper-V
This module provides instruction on how to migrate virtual machines hosted on earlier virtualization technologies to the Hyper-V server.
Migrating Legacy Virtual Machines
Understanding the Impact of Migrated VMs
Lab : Migrating Legacy Virtual Machines to Hyper-V (Migrate Existing Virtual Machines to Hyper-V; Troubleshoot Issues on the Migrated VMs)
M6331
Module 1: Installing System Center Virtual Machine Manager
Module 1 describes the installation prerequisites for VMM and describes the procedure for installing VMM. In addition, Module 1 describes the procedure to install the VMM Administrator Console and the VMM Self-Service Portal.
Installing System Center Virtual Machine Manager Server Components
Installing the VMM Administrator Console
Installing the VMM Self-Service Portal
Lab : Installing System Center Virtual Machine Manager (Installing VMM Server; Installing the VMM Administrator Console; Installing the VMM Self-Service Portal and Configuring a DNS Record)
Module 2: Configuring VM Hardware, Hosts, and User Roles
Module 2 describes host server hardware configuration considerations. In addition, Module 2 describes general host server configuration procedures including security configuration procedures.
Adding Hosts to VMM
Configuring Hardware
Configuring VMM Settings
Managing VMM Security
Lab : Configuring VM Hardware, Hosts, and User Roles (Configuring Hosts; Configuring VM Hardware; Configuring User Roles)
Module 3: Configuring the VMM Self-Service Portal and Library
Module 3 describes considerations and procedures for configuring the VMM Self-Service Portal and Library. This includes enabling user- or group-level access to the Self-Service Portal, configuring quotas, and using the Self-Service Portal to self-provision VMs. In addition, Module 3 describes procedures for maintaining VMM library servers and shares and the contents of library shares.
Configuring the VMM Self-Service Portal
Maintaining a VMM Library
Managing Library Files
Lab : Configuring the VMM Self-Service Portal and Library (Configuring the VMM Self-Service Portal; Maintaining a VMM Library)
Module 4: Deploying and Managing VMs
Module 4 describes VM deployment and management tasks. This includes using VMM Intelligent Placement, VM Templates, and other automated VM deployment tools. In addition, Module 4 describes using VMM to move VMs between available hosts.
Deploying VMs
Moving VMs Between Hosts
Lab : Deploying and Managing VMs (Deploying VMs; Using Intelligent Placement)
Module 5: Converting from Physical or Virtual Platforms
Module 5 describes important considerations for converting physical and virtual computers to Microsoft VMs. This includes procedures for using deployment agents to execute conversions to Microsoft VMs as well as converting from third-party formats.
Converting Physical Computers to Virtual Machines
Migrating Virtual Machines to Hyper-V
Lab : Converting Virtual Machines Using VMM (Converting a Microsoft Virtual Server VM; Converting a VMWare Virtual Machine)
Module 6: Deploying Highly Available VMs
Module 6 describes considerations and procedures for deploying clustered VMs.
Introducing Virtual Machine High Availability
Deploying Host Clustering
Deploying Guest Clustering
Lab : Planning for Highly Available Virtual Machines (Designing Host Clustering Hardware; Selecting Guest Clustering Type)
Module 7: Managing Virtual Machine Checkpoints and Updates
Module 7 describes procedures for managing VMs using checkpoints and updates. This includes identifying scenarios for using VMM VM Checkpoints and procedures for creating VM Checkpoints. In addition, Module 7 describes update deployment using WSUS and SCCM tools.
Managing Virtual Machine Checkpoints
Managing Virtual Machine Updates
Lab : Managing Virtual Machine Checkpoints and Updates (Managing Virtual Machine Checkpoints; Managing Virtual Machine Updates)
Module 8: Implementing Monitoring and Reporting
Module 8 describes procedures for integrating System Center Operations Manager with VMM to extend the capabilities of VMM. This includes using SCOM reporting with VMM. In addition, Module 8 describes using SCOM to select potential virtualization targets and to monitor and plan host server utilization.
Integrating System Center Operations Manager
Performance and Resource Optimization
Planning and Managing Hyper-V
Lab : Configuring VMM and Operations Manager for Reporting (Setting Up VMM for Reporting and PRO; Enabling PRO; Viewing Reports)
Module 9: Monitoring and Troubleshooting Jobs
Module 9 describes procedures for monitoring and troubleshooting VMM jobs. This includes monitoring and verifying multiple job types as well as recovering from failed jobs.
Monitoring Jobs
Troubleshooting and Repairing Jobs
Lab : Troubleshooting Jobs (Using PowerShell to View Jobs; Running PowerShell Script to Generate Jobs; Managing Jobs; Troubleshooting Failed Jobs)

Leave a Comment

SCE 2010 installation… cleaning up afterwards (deleting wasted space, moving dBs)

We installed the current beta of System Center Essentials 2010 on our production infrastructure server, an HP DL380-G4 running Windows Server 2008 R2 to find that we consumed a huge amount of disk space – so much so the server ran out of space on its C:System partition… oh and SCE didn’t report on this in its daily summary!

So a clean-up is required…

1st thing to delete was several hundred megabytes of files taken up with various language versions of MS Virtual Server 2005 binaries in:
C:\Program Files\System Center Essentials\SCVMM 2008\vs\  i386 & amd64
the ‘1033’ folders contain the english versions, the rest deleted

Next on the list is the SQL database files used by SCE, by default (no installation choices given, hopefully better by RTM!), these are installed into:
C:\Program Files\Microsoft SQL Server\MSSQL10.ESSENTIALS\MSSQL
C:\Program Files\Microsoft SQL Server\MSRS10.ESSENTIALS
each currently taking after about a week of SCE2010 running, some 748 & 580MB respectively!

in our case we also found another 417MB in C:\Program Files\Microsoft SQL Server\100\Setup Bootstrap\Update Cache\KB968369\ServicePack – will come back on this one, but have moved in the meantime…

and another 641MB in C:\Program Files\System Center Essentials\Health Service State\Health Service Store (one in particular, the HealthServiceStore.edb at 598MB!)

Leave a Comment

Microsoft tech•ed Europe 2009, Berlin, 12 November 2009

Slighty shabby and a late start to Thursday following the Windows Server 2008 R2 EAP dinner followed by the 1E TechEd party – a heavy night! 

For the dinner, the UK team chose a fabulous Italian restaurant called Bacco (www.bacco.de/english/restaurant/restaurant.html) which I’d definately go back to and hosted a great evening… many thanks to Stuart, Gareth, Neil, Alex, etc. from Microsoft UK. 

We were also joined by Allen Stewart & Rajesh Dave from corp.  Allen is Principal PM for Windows Server and Raj is a PM for Windows Hyper-V.  Both very interesting & incredibly knowledgable guys with deep understanding across a wide range of topics (and not just Microsoft!).
I pestered them for info on Hyper-V thin provisioning of memory and whilst they couldn’t confirm anything as we all said ‘we live in hope!’ 😉 

…as for the  night, I’d been invited to the 1E TechEd Europe party at Spindler & Klatt www.spindlerklatt.de – an uuber trendy restaurant/club in East Berlin frequented by the likes of Angelina, Clooney, and now Cook! 

What a great party and many many thanks to the team at 1E (www.1e.com).  Did I mention I was the 4th member of the business in the founding year?  (yes I probably did & several times.. lots to drunk! ;-)) We went our separate ways in 1999, oh for a slice of that now… anyway, moving on! 

Seriously though hats off to Samir, Mark, and Phil – they have built a company that knows how to throw a great party (regarded as the best at TechEd), and a team of very bright, talented people who have a lot of respect for the company and its founders. 

Ouch my head is pounding!  time to go to sessions, starting with… 

ITS211 Keeping Your CIO Happy: Microsoft Office SharePoint Server 2007 SLA Scorecarding with Operations Manager 2007 and SQL Server 2008

Gordon McKenna & Sean Roberts speaking at TechEd
Presenters: Gordon McKenna, Sean Roberts, www.inframon.com
Thu 11/12 | 10:45-12:00 | London 2 – Hall 7-1b
Learn how you can create CIO level SLA scorecards in SharePoint Server 2007 for Microsoft System Center Operations Manager 2007 using some of the new features in Microsoft SQL Server 2008 Reporting Services and to create Executive SLA views of your Operational Environment. The session looks at why these types of views are important to many companies, what impact this can have on your business, and what simple steps you can take to achieve very effective, high-level executive views of everything from performance and availability of your key LOB services and applications, whether important SLAs and KPIs are being achieved and whether your IT department is meeting the day-to-day needs of your business. The key demos in this session take you through the steps you need to implement effective business scorecarding in SharePoint Server 2007 using key metrics collected in the Operations Manager 2007 Datawarehouse based on “real-world” experiences gained from the field. After attending this presentation you will have a good insight into how CIO Scorecards can help you add value to your Operations Manager deployments, helping you to show real value to your executives.
Tip – to remove parameter data from Ops Mgr reports imported into a SharePoint webpart, suffix the url with &rc:Parameters=collapsed
Cracking session from Gordon & Sean on how to try and keep your CIO happy (if that’s possible! ;-))
blog Daniel Savage

Service Level dashboard – free solution accelerator dashboard on Microsoft 

SVR401 & 402 DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies + Part 2 of 2: Putting It All Together

John Cradock presents DirectAccess Technical Drilldown, Part 1 of 2: IPv6 and Transition Technologies 

Presenter: John Craddock (www.xtseminars.co.uk)
Thu 11/12 | 13:30-14:45 | Helsinki – Hall 7-2a
Take a sprinkling of Windows 7, add Windows Server 2008 R2, IPv6 and IPsec and you have a solution that will allow direct access to your corporate network without the need for VPNs. Come to these demo-rich sessions and learn how to integrate DirectAccess into your environment. In Part 1 learn about IPv6 addressing, host configuration and transitioning technologies including 6to4, ISATAP, Teredo and IPHTTPS. Through a series of demos learn how to build an IPv6 Network and interoperate with IPv4 networks and hosts. In Part 2 we add the details of IPSec, and components that are only available with Windows 7 and Windows Server 2008 R2 to build the DirectAccess infrastructure. Learn how to control access to corporate resources and manage Internet connected PCs through group policy. Part 1 is highly recommended as a prerequisite for Part 2.
John Craddock is an extremely talented AD/identity expert, and deeply technical across many other fields – in this case IPv6 & DA.
I was also lucky enough to have a drink with John and my old Microsoft PSS chum Paul Duffy on Monday night at the cleverly named hotel ‘Berlin Berlin’.
John is a genuine international industry expert and a thoroughly nice bloke with it!   Paul, another ‘genie-I’ went on to become PM for Office Communicator and knows a thing or ten about OCS amongst other subjects to a deep level.  This probably explains why these two know each other!
Anyway, back to the session plus my own notes, links, etc.
Gems & Tips
– be careful, not all apps will be compatible – test!
– to be native will likely mean new network gear, is new network layer (layer 2 unchanged)
– hex is back!  use of double colon notation, but can only be used once per address
– cannot mix with ipV4 mask bit notation
– host derived with mac address which has privacy issues, Win7 & R2 generate random based on interface, can be disabled (revert to mac based) with netsh interface ipv6 set global randomizeidentifiers=disabled
– route print -6 will show IPv6 route table
– ::1 is IPv6 loopback
– if you have a registered IPv4 address then you automatically have an IPv6 address on the 6to4 network
6to4 http://en.wikipedia.org/wiki/6to4 states 6to4 performs three functions:
  1. Assigns a block of IPv6 address space to any host or network that has a global IPv4 address.
  2. Encapsulates IPv6 packets inside IPv4 packets for transmission over an IPv4 network using 6in4.
  3. Routes traffic between 6to4 and “native” IPv6 networks.

– you need to manually unblock ISATAP entry in DNS which can be done via the registry or command line, e.g. 

C:\>dnscmd /config /globalqueryblocklist wpad 

Registry property globalqueryblocklist successfully reset.
Command completed successfully. 

ISATAP is a huge subject in it’s own right, the Intra-site Automatic Tunnel Addressing Protocol Deployment Guide is available at http://www.microsoft.com/downloads/details.aspx?familyid=0f3a8868-e337-43d1-b271-b8c8702344cd&displaylang=en 

Putting it all together..

– Check tunnel endpoint authentication using ‘klist’ to list Kerberos data
– Use NRTP to direct DNS queries to a specific server for a particular names space (view using ‘netsh namespace show effectivepolicy’)
– PKI needs to be right as certificates are the foundations
– you must publish the revocation list
– NLS (Nework Location Server) is just a https website accessible from the DA server, e.g. nls.corp.example.com
– if it doesn’t work, it could be a couple of days troubleshooting! 

If you’re thinking of setting this up in a virtual lab, I also took note from Allen Stewart’s blog at http://blogs.technet.com/wincat/

…if you’re planning to virtualize your lab environment on Hyper-V, you should ensure you’re using Legacy Network Adapters for the child partition where you’re running the DAS. Using the default synthetic NICs is OK for all the other resources in the test lab, but for the DAS itself, it’s important to have both the Internet and Corpnet NICs as legacy ones, to ensure proper passing of traffic between both sides of the DAS. If you use the default synthetic adapters, you may end up in a situation where traffic doesn’t properly flow from the outside to the inside, even though all your IPsec, 6to4, Teredo, and IP-HTTPS settings are correct. Basically, you’ll be in a situation where connectivity will fail at a basic level, with you not even being to successfully ping the internal DNS server using its ISATAP address.If you’ve already built your lab on Hyper-V using the synthetic adapters, the fix is pretty simple. Just replace them with legacy ones, reconfigure the IP addressing as specified in the guide and rerun the DirectAccess wizard, again supplying all the information specified in the guide. After doing so, all your traffic should flow properly.

– Thanks Allen!

DAT312 All You Needed to Know about Microsoft SQL Server 2008 Failover Clustering

Presenter: Gopal Ashok
Thu 11/12 | 17:00-18:15 | London 3 – Hall 7-1b
There are major architectural changes in SQL Server 2008 for failover cluster setup and management, geared towards increased reliability and high-availability. To learn all the benefits and changes, attend this session for a comprehensive overview direct from the product development group. We cover SQL Server 2008 failover clustering setup, underlying Windows Server cluster and how SQL Server uses it, what’s new in SQL Server 2008 for failover clustering, differences from previous versions of SQL Server and future directions. This includes details of SQL Server 2008 failover clustering setup operations together with demos to illustrate the new setup.

– new features
– applications need retry mechanisms built in to provide seamless failover
– no longer have to take down the cluster to upgrade, supports rolling upgrades 

Want to deploy stretched clusters?  lots do.  As in separate geo-redundant clusters, not separate nodes e.g. 

Stretched SQL Clusters or the doodles of an artist?

Stretched SQL Clusters or the doodles of an artist?

– sql 2008 failover clustering install breaks on windows server 2008 R2 and needs to be slipstreamed with SP1 (If only we knew this last weekend!)
(slipstreaming is incorporating patches into the installation media to effect a higher level of install base over RTM – Microsoft tend to do this but not always quickly!)
see http://blogs.msdn.com/psssql/archive/2009/03/17/how-to-fix-your-sql-server-2008-setup-before-you-run-setup-part-ii.aspx for more info
– during upgrades to a 2-node cluster there will be a period of time when you are exposed to node failure, and must not have a failover attempt for fear of corruption.  removing the node from the cluster owners will stop premature attempted failover. 

Further Microsoft resources.. (will add others also) 

      SQL Server ® 2008 Failover Clustering White Paper: http://sqlcat.com/whitepapers/archive/2009/07/08/sql-server-2008-failover-clustering.aspx 

      Recommended  Books Online  Doc Refresh #7 (May, 2009), or later: http://msdn.microsoft.com/en-us/library/ms130214.aspx 

      Failover Clusters – Getting Started: http://msdn.microsoft.com/en-us/library/ms189134.aspx 

      Rolling upgrade process and best practice: http://msdn.microsoft.com/en-us/library/ms191295.aspx 

      Maintaining a Failover Cluster: http://msdn.microsoft.com/en-us/library/ms178061.aspx 

      Setup command line usage: http://msdn.microsoft.com/en-us/library/ms144259.aspx 

      Configuration.ini file usage: http://msdn.microsoft.com/en-us/library/dd239405.aspx 

Leave a Comment

Microsoft tech•ed Europe 2009, Berlin, 11 November 2009

A daily update from Microsoft tech•ed Europe 2009, Berlin, 8-13 November 2009

Not the best day for me in terms of TechEd objectives (i.e. attending learning sessions, etc.) with the first post of the day saying ‘decisions decisions… for sessions just 09:00-10:15’ as struggled to choose between:

DAT302 Top 10 Best Practices for Microsoft SQL Server 2008 Analysis Services
or
MGT11-IS Get Virtualized with Microsoft System Center Essentials!
or
OFS322 Overview of Social Computing in SharePoint 2010
or
SVR207 Windows Server 2008 R2 File Classification Infrastructure: Managing your file data more effectively.
or
SVR319 Multi-Site Clustering with Windows Server 2008 R2

Ended up doing none of the above, but did have a productive breakfast meeting with Stuart Leddy, UK Windows Server Product Marketing Manager.  Stuart has been heading up the Windows Server 2008 R2 UK EAP activities that we have been involved in with Ascom Network Testing (http://blog.thefullcircle.com/2009/11/05/the-full-circle-secures-ascom-network-testing-for-windows-server-2008-r2-early-adopter-program/)

The day turned into going from one full session to the next, and walking back and forth for what seemed like miles in between!
my TechEd tip for the day – for popular sessions get there 10 minutes before they start!

Eventually did get into a 1st choice session I wanted at 12:20…

MGT03-DEMO Introduction to Microsoft System Center Essentials 2010

Presenters: Ravikiran Chintalapudi, David Mills, Eamon O’Reilly, Jeremy Winter
 
Come see the new customer-driven enhancements and fully integrated virtual management capabilities in the next release of Microsoft’s unified IT Management solution for medium-sized businesses, System Center Essentials 2010!
 
– great product, can manage 50 servers and 200 clients
 
 

SVR307 Security Best Practices for Hyper-V and Server Virtualisation

Jeff Woolsey, Senior Program Manager, Microsoft Virtualization
http://blogs.technet.com/virtualization/

Virtualisation is one of the hottest topics in IT today and security is a top priory for IT staff. In this session we cover security best practices for Hyper-V and introduce the Hyper-V Security Guide. This guide is Microsoft’s reference for hardening servers running Windows Server 2008 with Hyper-V enabled.

– Use of BitLocker
– AV scanning of offline VHD images… stale/dormant VMs that get reintroduced to the corporate network then can wreak havoc to new vulnerability exploits.  first product to do this is McAfee VirusScan Enterprise for Offline Virtual Images (rolls off the toungue!)
– AV configuration… added benefit of passthrough disks – host AV will scan these disks.  install AV on the guests!
– VHD performance, 2nd most popular VM workload in Microsoft is SQL! fixed disk performance is now on par with raw/real disk!  but remember spindles still count!
– Dynamic VHDs are now up to 15x faster with R2 – still a 10-15% performance hit over fixed, and the risk of disk over commit
– Multipath I/O (MPIO) in R2 & Win7 is soo much easier with iSCSI Quick Connect
– Advanced Storage Capabilities… storage dedupe and replication, if it is block based it will work
Hyper-V Networking – don’t forget the parent is a VM too!  the Hypervisor slides in beneath the O/S once enabled.  More NICs the better, min 2, min 3 with iSCSI
Jumbo Frames… Significant performance increases, but the infrastructure must support it.  also needs to be end-to-end.  confirm test with ping host -l 4000 -f – if you get a response you have jumbo frames
Virtual Machine Queues – Hyper-V R2 supports processing offloading to newer network adaptors (Intel, Broadcom, etc.), most benefit with 10Gb/E
– more tips… turn off screen savers in guests, in Windows Server 2003 create using 2-way to ensure MP HAL

more of a best practise and walkthrough of some basic tasks like not forgetting to install Intergration Component, good session and great blogger (not me – Jeff! ;-))

 

DAT301 Building and Implementing a High Availability Strategy for Your Enterprise

Presenter: Gopal Ashok
Wed 11/11 | 17:30-18:45 | London 3 – Hall 7-1b
Every business has mission-critical applications running on Microsoft SQL Server that require maximum uptime. Some application data is more critical than others and requires strict guarantees with regard to data loss. Depending on the application requirements and IT constraints, the availability strategy and corresponding technology choices will vary. As an architect, DBA, or IT admin it is important to develop the right HA strategy and corresponding solution which meets the availability requirement and at the same time provides the cost benefit for your organisation. Microsoft SQL Server 2008 Always On Technologies provide a full range of options to minimise downtime and maintain appropriate levels of application availability. Come to this session to learn how to develop a comprehensive HA solution using the Always On technologies. The session walks you through the various technologies and features, providing a cost-benefit analysis and comparison, talks about the key decision points to consider when choosing a technology, and showcases real-world examples of how these technologies are currently used to provide a High Availability solution for various customer environments around the world.

Leave a Comment

Older Posts »