When users configure Microsoft Hyper-V, they can focus on key technologies such as storage, failover, networking, and configuration automation. These modules are important, but when a user really decides to use a virtual system, virtual machine (VM) crashes and lack of visibility into virtual resources are the biggest threat. In the old version of the provisioning model, it took several weeks from the time a request was made to apply for a new server to the start of the system configuration, and now the process only takes a few minutes.
It's now convenient to start a new virtual machine, which means that the physical limitations of starting a new server are no longer there. When your resources are unrestricted, it can cause administrators to sink into it without understanding where these resources come from. Be aware that not only do all the machines cost money, but the CPU and storage resources used by the machine also require a license.
Considerations for Virtual Server Provisioning
So how do users control this situation? You can start by monitoring a new server. For example, because of the amount of time and effort spent on the process, it is almost impossible for a physical machine to be unnoticed, and a virtual machine can be much faster. This is especially useful when dealing with tests and using new virtual machines for new software testing in a QA environment. First, the user must ensure that all new machines and their uses and rights are recorded. Also, if the machine is for temporary use only, pay attention to their deadlines and strictly follow these dates.
Another problem faced by many Windows administrators is storage ambiguity, which is caused by the number of virtual machine connections reaching a certain number. Each time the user has to allocate 100 GB of storage for the hard disk of a new virtual machine, this will affect the performance of the storage area network (SAN). The Cluster Shared Volume (CSV) not only helps from the practical cluster, but also plays a role in configuration. It is especially effective when users use a highly centralized organizational structure to separate themselves from storage technology. Cluster shared volumes replace a new logical unit number (LUN) for each virtual machine, enabling users to request a larger LUN to store more virtual hard disk (VHD) files. This not only makes storage easier, but also makes the user more aware of the storage situation.
CSV also presents the challenge of balancing I/O requests that occur at the same time, affecting I/O performance when imbalances occur. For example, adding some high-end I/O port data servers to the queue can affect performance. This may seem unlikely, but it is easy to get this error when the user is configuring the machine too fast. Because of the heavy load, this error is especially likely to occur when the direct path to a SAN or iSCSI storage is just passed to the system administrator. So users need to make sure they know exactly where the content is stored and understand its configuration as it tracks its virtual machine.
Virtual Environment Server Configuration Standardization
Do not take further action until the configuration is standardized. Many virtual environments are in trouble due to operating manuals and cumbersome programs. From a technical point of view, there are several ways in which a user can continue the process.
There are several ways for beginners to automate a common machine:
- Use the system pre-preparation tool to create a storable image as a usable virtual machine.
- Use the Windows Configuration Service to put these machines in a configurable state.
- Automate configuration with WMI scripts and PowerShelll commands. (Note: Virtual switches for boot devices can be configured with scripts.)
Of course, users can also use a number of tools to implement these methods, help track VMs and add graphical user interfaces (GUIs) to these automation programs. For example, Microsoft's System Center Virtual Machine Management, Citrix Essentials, and other third-party products such as UC4 and HP Innsight are designed to help users improve their automation capabilities. From a larger perspective, these tools are a very wise investment. Similar to VMvare, the price and actual utilization of these tools will create an ROI for your system. But the key to using these tools is not just in configuration, but in application management.
Even if the user has the right tools and automation to standardize their own virtual machines, the previous configuration process still exists, so the user needs to view the current request process in the system. Usually users will see the network configuration requirements, such as IP address, system account. Connecting the machine to a dynamic directory requires multiple permissions and information. If users want their Hyper-V virtual infrastructure to be as sensitive as possible, you need to take the approach of the ultimate goal - to supply a new virtual machine.
To do this, you must make the system's standard configuration the same as the user's network configuration, including virtual LANs, subnets, and trunks. Negotiating storage locations with the SAN is also important during the configuration process. Finally, find out how to automate accounts and implement computer-led management, and if possible, hand it over to a secure script.
Users need to remember that the tool itself does not automate the process, and the way to configure the virtual machine is as flexible as the virtual technology. Whether you decide to use your own scripts or use these virtual management tools to configure them the same way – you are getting your team ready and enjoying the fast and agile services provided by server virtualization.
Log in to the Alibaba Cloud background, select Manage Console - Manage - Find Run
As the business transitions to next-generation virtualization technologies, the system consolidation
In this era of the Internet, IT has become an essential element for companies to gain market competi
mentioned FTP server, you may think of Serv-U, vs-FTP and other software, in fact, Microsofts built-
Establishing a socks5 proxy server
VPS performance testing tool: UnixBench
Summary and use of DHCP protocol commands
Tips: buy a brand server or assemble a server?
Serv-U 6.0.0.2 security settings Raiders
Server three major systems SMP, NUMA, MPP introduction
Use Active Log to quickly resolve IIS server failures
Set the custom 404 error page in IIS, can not enter the URL address solution
Solve the problem of AIX telnet service shutdown and slow response
Win10 opens multiple ways of registry editor
Encryption does not rely on passwords
Win8 Consumer Preview New Winkey Shortcuts Detailed Summary List
How to solve the wireless network limitation of Windows8 system
XP comes with fault recovery console application skills
New shortcuts make it easy to “one-button shutdown”
How to open the do not disturb time when playing games with Win10?
Microsoft: Windows7 comes from Vista but is far more mature than Vista