

Table of Contents
Cover
Title Page
Copyright
Publisher's Note
Acknowledgments
About the Authors
Foreword
Introduction
What Is Virtualization?
Microsoft’s Approach to Virtualization
Where Hyper-V Fits
Why We Wrote This Book
Who Should Read This Book
How the Book Is Organized
Final Thoughts
Chapter 1: Introduction to Hyper-V
Scenarios for Hyper-V
Architecture
Features
Requirements
Summary
Chapter 2: Installing Hyper-V and Server Core
Clean Installation of Hyper-V
Updating from Beta
Windows Server Core
Installing Windows Server 2008 as a Core Installation
Summary
Chapter 3: Configuring Hyper-V
Getting Started: The Hyper-V MMC
Creating a New Virtual Machine
Virtual Machine Settings
New Virtual Hard Disk Wizard
Virtual Network Manager
Summary
Chapter 4: Virtualization Best Practices
Host Best Practices
Virtual-Machine Best Practices
Summary
Chapter 5: Hyper-V Security
The Hyper-V Security Model
Virtual Machine Access Security Model
Working with the Authorization Manager
Summary
Chapter 6: Virtual Machine Migration
Migration Challenges and Drivers
Migration Considerations
Capturing the Configuration
Preparing a System for Migration
Capturing and Deploying Disk Images
Transposing Images
Walking through a Physical-to-Virtual Migration
Exporting and Importing in Hyper-V
Summary
Chapter 7: Backup and Recovery
Virtual Machine Backup Considerations
Host-Based Backup Approaches
Child Backup: Backing Up from Within
Manually Backing Up and Recovering a Virtual Machine
Summary
Chapter 8: High Availability
Windows Server 2008 Failover Clustering
Storage Considerations for Clustering
Building a Failover Cluster for Hyper-V
Clustered Virtual Machine Management
Summary
Chapter 9: Understanding WMI, Scripting, and Hyper-V
Common Management Tasks
WMI Overview
Scripting Technology Overview
PowerShell for Newcomers
Common Elements of WMI Scripts
Virtualization Classes
Summary
Chapter 10: Automating Tasks
Building on the Work of Others
Provisioning
Configuration Management
Managing Access
Migration
Backup and Recovery
Collecting and Monitoring Data
Summary
Chapter 11: Systems Center Virtual Machine Manager 2008
System Center Suite Overview
SCVMM 2008 Architecture Overview
Planning an SCVMM 2008 Deployment
Installing SCVMM 2008
Integrating SCOM 2007 and SCVMM 2008
Provisioning Virtual Machines
Summary
Chapter 12: Protecting Virtualized Environments with System Center Data Protection Manager
Technical Overview of Data Protection Manager
Protecting Your Hyper-V Environment
Configuring Protection of Hyper-V Hosts
Considerations When Protecting Virtualized Environments
Restoring Your Virtual Environment with DPM
Disaster Recovery Using DPM with SCVMM
Summary
Chapter 13: System Center Operations Manager 2007
SCOM Technical Overview
Using SCOM for Your Virtualization Environment
Monitoring and Reporting
Summary
Index
Advertisement
Acquisitions Editor: Agatha Kim
Development Editor: Stephanie Barton
Technical Editor: Arno Mihm
Production Editor: Eric Charbonneau
Copy Editor: Tiffany Taylor
Production Manager: Tim Tate
Vice President and Executive Group Publisher: Richard Swadley
Vice President and Publisher: Neil Edde
Book Designer: Judy Fung
Compositor: Craig Johnson, Happenstance Type-O-Rama
Proofreader: Kim Wimpsett
Indexer: Ted Laux
Project Coordinator, Cover: Lynsey Stanford
Cover Designer: Ryan Sneed
Cover Image: Ryan Sneed
Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana
Published simultaneously in Canada
ISBN: 978-0-470-44096-4
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Web site is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Web site may provide or recommendations it may make. Further, readers should be aware that Internet Web sites listed in this work may have changed or disappeared between when this work was written and when it is read.
For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (877) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Library of Congress Cataloging-in-Publication Data
Kelbley, John, 1967- Windows server 2008 Hyper-V : insiders guide to Microsoft’s Hypervisor / John Kelbley, Mike Sterling, Allen Stewart. — 1st ed. p. cm. ISBN 978-0-470-44096-4 (paper/website) 1. Microsoft Windows server Hyper-V. 2. Virtual computer systems. I. Sterling, Mike, 1977- II. Stewart, Allen, 1969- III. Title. QA76.9.V5K45 2009 005.4’476—dc22 2009005639
TRADEMARKS: Wiley, the Wiley logo, and the Sybex logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. Windows Server and Hyper-V are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.
10 9 8 7 6 5 4 3 2 1
Dear Reader,
Thank you for choosing Windows Server 2008 Hyper-V: Insider’s Guide to Microsoft’s Hypervisor. This book is part of a family of premium-quality Sybex books, all of which are written by outstanding authors who combine practical experience with a gift for teaching.
Sybex was founded in 1976. More than thirty years later, we’re still committed to producing consistently exceptional books. With each of our titles we’re working hard to set a new standard for the industry. From the paper we print on to the authors we work with, our goal is to bring you the best books available.
I hope you see all that reflected in these pages. I’d be very interested to hear your comments and get your feedback on how we’re doing. Feel free to let me know what you think about this or any other Sybex book by sending me an email at nedde@wiley.com, or if you think you’ve found a technical error in this book, please visit http://sybex.custhelp.com. Customer feedback is critical to our efforts at Sybex.
Best regards,
Neil Edde
Vice President and Publisher
Sybex, an Imprint of Wiley
Acknowledgments
Writing a book about a new technology is a complex task, and like most such labors, it has been a team effort. As the front cover notes, this book has (at least) three authors, with contributions from many others. Sincere thanks go out to my co-writers and their families (who suffered much like mine!). Dividing the book into separate sections allowed us to, we hope, produce a better book more quickly than any one of us could have on our own. Writing a book sounds like a great idea before you start (and it is), but it takes far longer to complete and requires a great deal more effort than I ever would have imagined. My wife, Sylvia, and my sons, Andrew and Alexander, have been more than patient with me this last year while I put off other commitments and borrowed computer capacity from the infrastructure at home.
Many co-workers and friends helped out (including many members of the Virtualization Nation), but I am most grateful for the feedback from the technical titans who were willing to read, critique, or contribute to my chapters (Arno Mihm, Alexander Lash, James O’Neill, Ben Herman, Alex Kibkalo, and Matt Lavallee). The dialogues with James and Ben in particular on the scripting chapters were great for the book (and for me), with my regret being that we didn’t write an entire book about Hyper-V scripting. There just isn’t enough space in two chapters for all the suggestions from James, Ben, and Alex.
Thanks to the patient, professional editors (Agatha Kim, Stephanie Barton, and Eric Charbonneau) and others at Wiley who turned our ideas, sentences, and cocktail-napkin class diagrams into things more intelligible. The editorial process is still largely a mystery to me—a testament to the quality of their work!
—John Kelbley
When I sat down with John for dinner in Houston, I had no idea what I was getting myself into. “Hey Mike, want to help me write a book?” After a couple glasses of wine, he had convinced me that writing a book was a great idea. Now that the book is complete, I can heartily agree.
Having worked with virtualization since the beginnings of Virtual PC for the Macintosh, I’ve seen huge advancements made with the usage of virtualization. No longer is it just a fun tool for your friends on your Mac—we’ve moved on to server virtualization and even more wide-scale adoption of what was previously a niche technology. This book is a way for me to try to get some of the information that has sat in my head for the last 10 years onto paper.
No acknowledgments section would be complete without a list of people I need to thank. First and foremost, I need to thank my wife, Nancy, and my son, Maxwell—the reason I had enough time to write my portions of the book. Thank you for supporting me through the late nights that were necessary to get this done. My co-authors, John and Allen, were immensely helpful in making sure we covered everything. Our technical reviewers, Arno and James, did a great job of keeping us honest. Last, I need to thank the editorial staff—Agatha, Stephanie, and Eric—who have done an exceptional job of taking our words and crafting them into something that people want to read.
—Mike Sterling
Hmm, what did I get myself into? I thought, as I was writing at 3 a.m. on a cold wintery morning. Just kidding. I am super-excited to write about virtualization technology, a disruptive technology that will affect information technology for years to come. We have only started to scratch the surface and discover the many ways we’ll use virtualization technology. This is the first salvo into what is and will become a common technology in any company’s IT infrastructure. The more I work with enterprise customers that are pushing the scenarios and use cases for virtualization, the more the virtualization vision expands.
I would like to thank my parents—most of all my mother, Bernice, for instilling in me the importance of hard work, an anything-is-possible approach to life, and a glass-is-always-half-full attitude. To my little girl, Allana, thanks for giving Daddy the extra push I need: thanks, Bear. To my sisters Joyce, Brenda and my nieces, thanks for not bothering me when I had to write (just kidding—love you guys). To my brother Dwayne, thanks for putting up with an absent brother—love you, man. To my other family members—Les, Cheryl, and Donna—thanks for the support. My co-authors, John and Mike: you guys rock!! Jason Buffington, DPM expert: thanks for the DPM chapter; you’re the man. Thanks for the technical review, Arno. Thanks to Iain, Ram, and Chris for making working in the Windows Server Group the best job a guy could have. The editorial staff has super-human patience and skill; I would like to thank Agatha, Stephanie, and Eric, who’ve done an exceptional job, and we could not have done it without them.
—Allen Stewart
About the Authors
John Kelbley is a senior technical product manager with Microsoft’s Platform Tech Strategy team based in the Northeastern United States. He joined Microsoft in 2002 after working at a number of large enterprises as a management consultant, IT manager, and infrastructure architect. John has more than 20 years of computing industry experience with a focus on infrastructure architecture. This is the first book he has authored since leaving grade school.
Mike Sterling is a program manager in the Windows Server team at Microsoft, focused exclusively on virtualization. Prior to this role, Mike spent 10 years in software testing, working on products such as Virtual PC, Virtual Server, and Hyper-V. When he’s not working, he can be found playing World of Warcraft or out taking photographs.
Allen Stewart is a principal program manager lead in the Windows Server group at Microsoft. Allen focuses on virtualization technologies such as hardware virtualization, virtualization management, and application virtualization. Allen has more than 15 years of IT experience in the transportation, financial services, and software industries. He has held various positions as a senior systems programmer, systems architect, and systems consultant. Allen is a Microsoft certified architect, and he is on the board of directors of the Microsoft Certified Architect Program. When not playing with his little girl, Allana, or exploring new technology on his home systems, he loves to play basketball (he could probably beat President Obama in a pickup game…you hear that, Mr. President?).
Jason Buffington has been working in the networking industry since 1989, with a majority of that time being focused on data protection. He has spoken around the world at large technology events and been published in several periodicals. With more than 18 years of storage/backup experience, Jason is currently the senior technical product manager for Microsoft Storage Solutions, with a special focus on Data Protection Manager. He has previously held roles with Double-Take, Cheyenne (CA) ARCserve, and various systems integrators. Jason telecommutes from Dallas, Texas, where he is happily married to Anita for 16 years and is the proud father of three great kids—Joshua, Jaden and Jordan. He can be reached at JasonBuffington.com.
Foreword
What’s old is new again. In the case of virtualization, truer words have never been spoken. In the past few years, virtualization—a technology commonplace for decades on mainframe systems—has made its way to commodity x86/x64 systems, and its renaissance is changing the way companies do business. Virtualization is a hot technology for many reasons; and if you haven’t considered virtualization, there’s no better time than the present. As is the case with most burgeoning technologies, a lot of confusion exists in the marketplace, starting with the term itself.
Virtualization is one of the most overloaded terms in the recent past. In the most generic sense, it simply means the abstraction of resources. The most popular type of virtualization is machine virtualization, where a virtual machine is presented in software with its own virtual hardware and abstracted from the underlying physical hardware. This allows most x86 workloads to run unmodified within virtual machines, isolated from other workloads, and opens up new ways to deploy and manage software.
Adoption of virtualization is accelerating due to the confluence of three main factors:
From a benefits standpoint, virtualization offers significant advantages in terms of greater system utilization, lower power consumption, reduced datacenter footprint, ease of deployment, and overall flexibility. You can do more with less, do it more cheaply, and do it faster with more flexibility.
Does this sound too good to be true? Are you skeptical? I hope so.
It’s easy to be swept up in the hype and cut corners in planning and research, resulting in a less-than-optimal experience. Too often, we’ve run into people who have heard about the benefits of virtualization but who don’t understand how it changes other IT aspects such as system and application monitoring, high availability, patch management, backups, and security. Like any disruptive technology, virtualization can provide solutions to many problems but also introduce new challenges. This book is a great way to avoid any pitfalls.
At Microsoft, we listen closely to our customers. One consistent message from is that they want high-performance, easy-to-use, hypervisor-based virtualization. Not a technology that only the high-end enterprises with deep pocketbooks can afford. We agree. With all the benefits that virtualization provides, we want to make this technology available to everyone, whether you’re a small business, in a branch office, or a global Fortune 500 company. Toward that end, we’re pleased to offer Hyper-V both as a role included with Windows Server 2008 and as a free standalone product, Microsoft Hyper-V Server 2008.
Since the Hyper-V release, customer reaction has been overwhelmingly positive, resulting in over 600,000 downloads of Hyper-V technology in just over the first six months of its release. Within Microsoft, Hyper-V has been extensively deployed throughout the company; thousands of Hyper-V virtual machines run a substantial portion of our day-to-day production infrastructure. In addition, if you’ve been to a Microsoft Web site, you’ve most likely interacted with a Hyper-V virtual machine. Why? Because some of Microsoft’s largest Internet sites including TechNet, MSDN (both receive a few million hits per day), and Microsoft.com (more than a billion hits per month) are hosted with Hyper-V. These examples demonstrate the performance, scalable, and reliability that Hyper-V has to offer while running some of the largest Internet properties on the planet.
If you’re not employing virtualization today—if you haven’t tried Hyper-V yet—I strongly urge you to do so with this book in hand. There’s never been a better time to get started, and we have a long roadmap ahead.
—Jeffrey WoolseyPrincipal Group Program Manager, Microsoft Virtualization
Introduction
Welcome to the best book we’ve ever written about Microsoft’s hypervisor technology: Hyper-V! Hyper-V is a foundational virtualization technology released in 2008 by Microsoft, and this book is intended to be a resource for systems administrators looking to use it in a cost effective and efficient manner. Other books may be written about Hyper-V, but no others so far have appeared on the landscape written by those who helped shape or support the product.
The book is meant to cover the essentials of using Hyper-V, giving you the information necessary to get up and running quickly. The book includes technical depth (some not found anywhere else), but it isn’t intended as a comprehensive guide to all aspects of Hyper-V.
What Is Virtualization?
At its simplest, virtualization is the abstraction of computing from computers. Separating software from hardware isn’t a new concept. Administrators have done it for many years on all sorts of platforms. Nearly any system or system component can be somehow pulled away or separated from the hardware or software on which it depends. In Windows-centric environments, complete operating system instances can be virtualized using Hyper-V, Virtual Server, and Virtual PC. Windows systems can also be virtualized with products from other companies, including VMware. This full-system virtualization is only one type of computing abstraction.
Virtualization can happen at nearly any computing boundary within a system. The broad definition and interpretation of virtualization has led to a virtualization frenzy in all forms. It seems as if every software and hardware company has a virtualization offering of some kind. For good or for bad, the word virtualization has been tagged onto products and solutions across the computing industry. It sounds like virtualization is the next great thing in computing. It’s already here, so it actually was the next great thing! In all its present forms, virtualization is providing value to enterprises and individuals and has been doing so for some time.
Microsoft’s Approach to Virtualization
Some software companies address virtualization from a single direction. VMware, for example, focuses on virtualizing and managing operating-system instances. Microsoft has been more thoughtful and less myopic in its approach. Microsoft’s articulated virtualization direction is in five key areas:
All these approaches are tied together by Windows as a platform and managed by the System Center family of products to enable administration of virtual and physical resources.
You can benefit from this multipronged approach to virtualization, which is unified by a common platform and management suite.
It’s All Windows
The great thing about virtualization technology from Microsoft is that it’s integrated with Windows. Windows is a platform well known to administrators and users alike. You don’t need special training to use Microsoft’s virtualization offerings because they’re already familiar. You don’t need to be a virtualization specialist to use Hyper-V, Terminal Services, or AppV (as you might with VMware). You can have virtualization as a competency, just as you might with other focus areas of Windows administration.
System Center Manages All Worlds Well
You manage and monitor each of these virtualization offerings with the same System Center tools that you may already have in your environment for physical system management. Some virtualization-management tools only provide insight into the virtualization layer and can’t dive further into running operating systems or applications (they’re essentially half blind). Using a unified, familiar tool set that can correlate data between physical, virtual, and application software can magnify the benefits of virtualization.
Mixing and Matching with Virtualization
You can use these separate directions of virtualization together with the others to provide more value. You can combine the different focuses of virtualization—server, desktop, presentation, application, and profile—to meet the needs and requirements of changing enterprises. Why not rapidly provision Hyper-V–based virtual machines for thin-client access to meet dynamic demands? How about combining AppV with Terminal Services to alleviate application coexistence issues and reduce server count?
Where Hyper-V Fits
Hyper-V is Microsoft’s efficient hypervisor that enables operating-system virtualization in a server environment. Hyper-V is a core technology pillar of Microsoft’s virtualization strategy and the focus of this book. It’s an installable feature of Window Server 2008 and is available as a no-cost download as Hyper-V Server. Even with other virtualization solutions already installed, Hyper-V can be part of any contemporary Windows Server infrastructure, based on availability and price.
Why We Wrote This Book
Just before the release of Hyper-V, we realized there were few books on the horizon addressing this important and industry-altering technology. We agreed that a book should be written to bring together the combined available information and knowledge we had in developing, using, and managing Hyper-V. We had all read books written by professional authors about technology and felt that the insight of those closer to the product (not professional authors) could serve the needs of administrators well.
Who Should Read This Book
Everyone and anyone interested in understanding Hyper-V and how to use it should read this book. We developed the content specifically for Windows administrators. IT professionals with some experience using Windows Server 2003 or Windows Server 2008 will get the most out of the book. Some chapters are more technical than others, but notes, tips, and pointers to necessary resources are included to make every (aspiring server administrator) reader productive.
Readers are expected to be familiar with Windows and have some experience with and understanding of Windows Server 2008. You don’t need extensive server-administration experience to benefit from the book, only a desire to learn more about Hyper-V and how to use it.
How the Book Is Organized
The book is organized and written with a crawl, walk, run philosophy. We’ll introduce you to server virtualization and Hyper-V administration and then lead you along to expose you to enterprise management concepts and tools for virtualization. We’ve purposely organized the book into three distinct sections to address separate levels of interest and to provide you with three different perspectives on Hyper-V. Each section of the book is written by a different author who has specialized knowledge and expertise in that area.
The first section (Chapters 1 through 5), or the crawling section, is geared toward making you productive with Hyper-V as quickly as possible. These chapters are focused on introducing Hyper-V, setting it up, and running virtual hosts in an efficient and secure manner using little more than the Hyper-V console:
Chapter 1: Introduction to Hyper-V
Chapter 2: Installing Hyper-V and Server Core
Chapter 3: Configuring Hyper-V
Chapter 4: Virtualization Best Practices
Chapter 5: Hyper-V Security
The second, walking section (Chapters 6 through 10) builds on knowledge from the earlier chapters. The middle of the book dives into more advanced manual administration tasks and concepts. Here we wade into complicated and necessary topics including virtual machine migration, backup and recovery, failover clustering, and automation through scripting. We show you how to handle advanced administration tasks manually or through custom automation:
Chapter 6: Virtual Machine Migration
Chapter 7: Backup and Recovery
Chapter 8: High Availability
Chapter 9: Understanding WMI, Scripting, and Hyper-V
Chapter 10: Automating Tasks
The final section of the book (Chapters 11 through 13) is the running or soaring with eagles part of the book. These chapters introduce you to the most effective way to manage an enterprise virtualization environment with several members of the Microsoft System Center family of products. One chapter is devoted to each of three products that are commonly used for server virtualization management (Operations Manager, Virtual Machine Manager, and Data Protection Manager):
Chapter 11: System Center Virtual Machine Manager 2008
Chapter 12: Protecting Virtualized Environments with System Center Data Protection Manager
Chapter 13: System Center Operations Manager 2007
Final Thoughts
The best way to learn about Hyper-V is to be hands-on with it. If you can, take some time to load Windows Server 2008 with Hyper-V on a capable system. This book provides lots of great tips and tricks for using Hyper-V, and trying them firsthand is a great way to develop your understanding and expertise.
Inexpensive systems available today include hardware-assisted virtualization support (as well as x64 support) and make serviceable Hyper-V test systems. You don’t even need new systems for Hyper-V—just a host with Intel VT or AMD-V support. Many of the examples in the book were developed and tested on laptops and desktop systems more than two years old. An older desktop or laptop may not be in any way suitable for production use with Hyper-V, but it can be perfect for you to build a better understanding of this important and useful virtualization technology.