Introduction |
|
xix | |
|
Chapter 1 Introducing Hyper-V |
|
|
1 | (16) |
|
|
1 | (2) |
|
|
1 | (1) |
|
|
2 | (1) |
|
Business Continuity and Disaster Recovery |
|
|
2 | (1) |
|
|
3 | (1) |
|
|
3 | (8) |
|
|
4 | (3) |
|
|
7 | (4) |
|
|
11 | (2) |
|
|
11 | (2) |
|
New Features in Windows Server 2008 R2 |
|
|
13 | (1) |
|
Hardware and Software Requirements for Hyper-V |
|
|
13 | (3) |
|
Hardware Requirements and Best Practices |
|
|
13 | (2) |
|
|
15 | (1) |
|
|
16 | (1) |
|
Chapter 2 Installing Hyper-V and Server Core |
|
|
17 | (18) |
|
Performing a Clean Installation of Hyper-V |
|
|
17 | (5) |
|
Meeting the Installation Requirements |
|
|
18 | (1) |
|
Installing the Hyper-V Role |
|
|
19 | (1) |
|
|
20 | (2) |
|
Updating from the Beta Version to the Final Version of Hyper-V |
|
|
22 | (1) |
|
Performing the Pre-update Configuration |
|
|
22 | (1) |
|
Performing the Post-update Configuration |
|
|
23 | (1) |
|
Upgrading Hyper-V from Windows Server 2008 to Windows Server 2008 R2 |
|
|
23 | (1) |
|
Installing Windows Server Core |
|
|
24 | (3) |
|
Exploring the Windows Server Core Architecture |
|
|
24 | (2) |
|
Managing Windows Server Core |
|
|
26 | (1) |
|
Installing Windows Server 2008 as a Core Installation |
|
|
27 | (6) |
|
Installation Considerations and Requirements |
|
|
27 | (1) |
|
Performing a Core Installation |
|
|
27 | (1) |
|
Doing the Initial Configuration |
|
|
28 | (2) |
|
Installing Hyper-V Under Windows Server 2008 Server Core |
|
|
30 | (2) |
|
New in Windows Server 2008 R2: Introducing sconfig |
|
|
32 | (1) |
|
|
33 | (2) |
|
Chapter 3 Configuring Hyper-V |
|
|
35 | (28) |
|
Getting Started: The Hyper-V MMC |
|
|
35 | (2) |
|
Creating a New Virtual Machine |
|
|
37 | (5) |
|
|
42 | (13) |
|
|
42 | (9) |
|
Virtual Machine Management |
|
|
51 | (4) |
|
New Virtual Hard Disk Wizard |
|
|
55 | (3) |
|
Exploring Types of Virtual Hard Disks |
|
|
55 | (2) |
|
Using the Wizard to Create Virtual Hard Disks |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (2) |
|
|
61 | (2) |
|
Chapter 4 Visualization Best Practices |
|
|
63 | (16) |
|
|
63 | (12) |
|
|
63 | (5) |
|
How Much Memory Is Enough? |
|
|
68 | (1) |
|
Storage: How Many Drives Do I Need? |
|
|
69 | (1) |
|
|
70 | (4) |
|
Host Operating System Best Practices |
|
|
74 | (1) |
|
Virtual Machine Best Practices |
|
|
75 | (3) |
|
Integration Services: Guest Drivers |
|
|
76 | (1) |
|
Sysprep: Creating a Master Base Image |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Chapter 5 Hyper-V Security |
|
|
79 | (16) |
|
The Hyper-V Security Model |
|
|
79 | (2) |
|
|
80 | (1) |
|
Visualization Stack Security |
|
|
81 | (1) |
|
The Virtual Machine Access Security Model |
|
|
81 | (1) |
|
Working with the Authorization Manager |
|
|
82 | (12) |
|
Understanding the Terminology |
|
|
82 | (1) |
|
Using the Authorization Manager for Hyper-V Security |
|
|
82 | (12) |
|
|
94 | (1) |
|
Storing the AzMan Store in Active Directory |
|
|
94 | (1) |
|
|
94 | (1) |
|
Chapter 6 Virtual Machine Migration |
|
|
95 | (32) |
|
Migration Challenges and Drivers |
|
|
95 | (3) |
|
Physical to Virtual (P2V) Migration |
|
|
97 | (1) |
|
Virtual to Virtual (Vp2V) Migration |
|
|
97 | (1) |
|
Virtual to Physical (V2P) |
|
|
98 | (1) |
|
|
98 | (1) |
|
Capturing the Configuration |
|
|
99 | (5) |
|
Creating a Manual Inventory |
|
|
99 | (1) |
|
|
100 | (4) |
|
Preparing a System for Migration |
|
|
104 | (1) |
|
Capturing and Deploying Disk Images |
|
|
104 | (3) |
|
Manual Migration with Image-Capture Tools |
|
|
104 | (1) |
|
Using Traditional Backup and Recovery Tools: SCVMM and Windows Home Server |
|
|
105 | (1) |
|
Common Dedicated P2V Tools |
|
|
106 | (1) |
|
|
107 | (1) |
|
Walking through a Physical-to-Virtual Migration |
|
|
108 | (12) |
|
Traditional Imaging: Collecting and Creating Your Imaging Toolkit |
|
|
108 | (8) |
|
Easy Image Capture: Disk2VHD |
|
|
116 | (1) |
|
Firing Up: Performing System Updates |
|
|
117 | (3) |
|
Exporting and Importing in Hyper-V |
|
|
120 | (5) |
|
Exporting a Virtual Machine Locally |
|
|
120 | (1) |
|
Exporting Over the Network |
|
|
121 | (2) |
|
Importing a Virtual Machine |
|
|
123 | (2) |
|
|
125 | (2) |
|
Chapter 7 Backing Up and Recovering VMs |
|
|
127 | (32) |
|
Virtual Machine Backup Considerations |
|
|
127 | (6) |
|
Using the Volume Shadow Copy Services |
|
|
128 | (2) |
|
Using VSS Backups and Saving State |
|
|
130 | (2) |
|
Hyper-V Snapshots Are Not Backups! |
|
|
132 | (1) |
|
Host-Based Backup Approaches |
|
|
133 | (4) |
|
|
133 | (1) |
|
Physical to Virtual Conversion |
|
|
134 | (1) |
|
Manual VHD Backup and Recovery |
|
|
134 | (1) |
|
|
135 | (1) |
|
Enterprise Backup Tools and Solutions |
|
|
135 | (1) |
|
|
135 | (1) |
|
Backup Encapsulation Benefits |
|
|
135 | (1) |
|
Beware of Bloat in Host Backups |
|
|
136 | (1) |
|
Child Backup: Backing Up from Within |
|
|
137 | (1) |
|
VM Backup Driven by Storage |
|
|
137 | (1) |
|
VM Backup Driven by Applications |
|
|
138 | (1) |
|
Cluster-Shared Volumes and Backup |
|
|
138 | (1) |
|
Manually Backing Up and Recovering a Virtual Machine |
|
|
138 | (20) |
|
Performing a Windows Server Backup |
|
|
138 | (11) |
|
Performing a Manual Backup |
|
|
149 | (9) |
|
|
158 | (1) |
|
Chapters 8 High Availability |
|
|
159 | (28) |
|
Windows Server 2008 Failover Clustering |
|
|
159 | (8) |
|
Failover Clustering Basics |
|
|
161 | (2) |
|
Quick Migration vs. Live Migration |
|
|
163 | (1) |
|
|
163 | (1) |
|
Protecting the VM vs. Protecting the Application |
|
|
163 | (1) |
|
Required Components for Failover Clustering |
|
|
164 | (3) |
|
Storage Considerations for Clustering |
|
|
167 | (3) |
|
Using Pass-Through Disk to Improve Performance |
|
|
167 | (1) |
|
Clustering with GUIDs and Mount Points |
|
|
168 | (1) |
|
Configuring Multiple VMs on a Single Physical Volume |
|
|
168 | (1) |
|
Clustered Shared Volumes in R2 |
|
|
169 | (1) |
|
Backup and Recovery of a VM's Host CSV |
|
|
169 | (1) |
|
Building a Failover Cluster for Hyper-V |
|
|
170 | (15) |
|
Setting Up a Failover Cluster |
|
|
171 | (10) |
|
Hyper-V Server 2008 R2 and Server Core |
|
|
181 | (2) |
|
Configuring iSCSI from the Command Line |
|
|
183 | (2) |
|
Clustered Virtual Machine Management |
|
|
185 | (1) |
|
|
186 | (1) |
|
Chapter 9 Understanding WMI, Scripting, and Hyper-V |
|
|
187 | (38) |
|
|
187 | (2) |
|
|
189 | (2) |
|
|
191 | (4) |
|
|
192 | (1) |
|
Accessing the Virtualization Namespace |
|
|
192 | (1) |
|
WMI Scripting Tools and Resources |
|
|
192 | (1) |
|
Browsing the Virtualization Namespace |
|
|
192 | (3) |
|
Scripting Technology Overview |
|
|
195 | (3) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (15) |
|
PowerShell Installation and Setup |
|
|
198 | (3) |
|
Finding Your Way Around PowerShell |
|
|
201 | (2) |
|
Making Things Work in PowerShell |
|
|
203 | (10) |
|
Common Elements of WMI Scripts |
|
|
213 | (3) |
|
|
213 | (2) |
|
|
215 | (1) |
|
|
216 | (7) |
|
Useful WMI Virtualization Classes to Know |
|
|
216 | (3) |
|
The Msvm_ComputerSystem Class |
|
|
219 | (4) |
|
|
223 | (2) |
|
Chapter 10 Automating Tasks |
|
|
225 | (44) |
|
Building on the Work of Others |
|
|
225 | (4) |
|
|
226 | (1) |
|
|
227 | (2) |
|
|
229 | (9) |
|
|
229 | (2) |
|
Setting BIOS Options, Startup/Shutdown, and Additional Elements |
|
|
231 | (2) |
|
Remote Virtual Machine Provisioning |
|
|
233 | (1) |
|
|
234 | (2) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
238 | (20) |
|
|
238 | (7) |
|
|
245 | (3) |
|
Managing the Virtual Environment |
|
|
248 | (6) |
|
Maintaining Virtual Systems |
|
|
254 | (4) |
|
|
258 | (1) |
|
|
258 | (2) |
|
|
258 | (1) |
|
|
259 | (1) |
|
|
259 | (1) |
|
Virtual to Virtual Migration |
|
|
260 | (1) |
|
|
260 | (1) |
|
Collecting and Monitoring Data |
|
|
260 | (7) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Accessing Processor Performance Data |
|
|
262 | (5) |
|
Performance Monitoring and PowerGadgets |
|
|
267 | (1) |
|
|
267 | (2) |
|
Chapter 11 Using System Center Virtual Machine Manager 2008 |
|
|
269 | (36) |
|
System Center SuiteOverview |
|
|
269 | (4) |
|
System Center Virtual Machine Manager 2008 |
|
|
270 | (1) |
|
System Center Operations Manager 2007 |
|
|
270 | (1) |
|
System Center Data Protection Manager 2007 SPI |
|
|
271 | (1) |
|
System Center Configuration Manager 2007 |
|
|
272 | (1) |
|
SCVMM 2008 Architecture Overview |
|
|
273 | (7) |
|
|
275 | (1) |
|
SCVMM 2008 Library Server |
|
|
275 | (1) |
|
|
276 | (1) |
|
SCVMM Administrator Console |
|
|
277 | (1) |
|
|
278 | (1) |
|
SCVMM Additional Components |
|
|
279 | (1) |
|
|
280 | (8) |
|
|
280 | (1) |
|
Installing the SCVMM 2008 Server Role |
|
|
281 | (2) |
|
Installing the SCVMM 2008 Administrator Console |
|
|
283 | (1) |
|
|
283 | (1) |
|
Creating Your First VM in SCVMM |
|
|
284 | (2) |
|
Installing the SCVMM 2008 Self-Service Portal |
|
|
286 | (2) |
|
Integrating SCOM 2007 and SCVMM 2008 |
|
|
288 | (6) |
|
Enabling PRO Functionality |
|
|
289 | (3) |
|
Customizing the Base PRO Monitors |
|
|
292 | (2) |
|
Provisioning Virtual Machines from the Library |
|
|
294 | (10) |
|
|
294 | (1) |
|
|
295 | (4) |
|
Provisioning Systems via P2V Functionality |
|
|
299 | (2) |
|
Creating Highly Available Virtual Machines |
|
|
301 | (3) |
|
|
304 | (1) |
|
Chapter 12 Protecting Virtualized Environments with System Center Data Protection Manager |
|
|
305 | (34) |
|
Overview of Data Protection Manager |
|
|
305 | (5) |
|
|
306 | (1) |
|
|
307 | (1) |
|
Understanding DPM Storage |
|
|
307 | (3) |
|
Protecting Your Hyper-V Environment |
|
|
310 | (11) |
|
Setting Up Your First DPM Server |
|
|
310 | (5) |
|
Introducing the DPM Administrator Console |
|
|
315 | (1) |
|
Deploying Agents and Application Workload Prerequisites |
|
|
315 | (5) |
|
|
320 | (1) |
|
Configuring Protection of Hyper-V Hosts |
|
|
321 | (8) |
|
What Do You Want to Protect? |
|
|
322 | (1) |
|
How Do You Want to Protect It? |
|
|
323 | (1) |
|
Configuring Disk-Based Protection |
|
|
323 | (4) |
|
Configuring Tape-Based Protection |
|
|
327 | (1) |
|
Setting Up the Initial Baseline |
|
|
327 | (2) |
|
Considerations When Protecting Virtualized Environments |
|
|
329 | (3) |
|
Virtual Machines, Hosts, and Guests |
|
|
329 | (1) |
|
Choosing What to Protect and How to Recover |
|
|
330 | (1) |
|
Protecting Virtual Machines from the Host |
|
|
331 | (1) |
|
Choosing Guest or Host or Both |
|
|
331 | (1) |
|
Restoring Your Virtual Environment with DPM |
|
|
332 | (5) |
|
Overview of the DPM Restore UI |
|
|
332 | (1) |
|
Restoring a Virtual Machine from the DPM UI |
|
|
333 | (4) |
|
|
337 | (2) |
|
Chapter 13 Using System Center Operations Manager 2007 |
|
|
339 | (20) |
|
Introduction to System Center Operations Manager 2007 |
|
|
339 | (1) |
|
|
340 | (4) |
|
|
341 | (1) |
|
Optional Server Roles and Components |
|
|
342 | (2) |
|
|
344 | (1) |
|
Using SCOM for Your Virtualization Environment |
|
|
344 | (7) |
|
Scenario 1 Deploying a New SCOM Environment |
|
|
345 | (4) |
|
Scenario 2: SCOM Already Deployed |
|
|
349 | (2) |
|
|
351 | (6) |
|
|
357 | (2) |
Index |
|
359 | |