Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
System Center 2016 Virtual Machine Manager Cookbook
System Center 2016 Virtual Machine Manager Cookbook

System Center 2016 Virtual Machine Manager Cookbook: Design, configure, and manage an efficient virtual infrastructure with VMM in System Center 2016 , Third Edition

Arrow left icon
Profile Icon EDVALDO ALESSANDRO CARDOSO Profile Icon Levchenko
Arrow right icon
€41.99
Full star icon Full star icon Full star icon Full star icon Empty star icon 4 (6 Ratings)
Paperback Feb 2018 562 pages 3rd Edition
eBook
€22.99 €32.99
Paperback
€41.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon EDVALDO ALESSANDRO CARDOSO Profile Icon Levchenko
Arrow right icon
€41.99
Full star icon Full star icon Full star icon Full star icon Empty star icon 4 (6 Ratings)
Paperback Feb 2018 562 pages 3rd Edition
eBook
€22.99 €32.99
Paperback
€41.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€22.99 €32.99
Paperback
€41.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Table of content icon View table of contents Preview book icon Preview Book

System Center 2016 Virtual Machine Manager Cookbook

VMM 2016 Architecture

In this chapter, we will cover:

  • Understanding each component for a real-world implementation
  • Planning for high availability
  • Designing the VMM server, database, and console implementation
  • Specifying the correct system requirements for a real-world scenario
  • Licensing the System Center VMM 2016
  • Troubleshooting VMM and supporting technologies

Introduction

This chapter has been designed to provide an understanding of the underlying Virtual Machine Manager (VMM) modular architecture, which is useful to improve the implementation and troubleshooting VMM.

The first version of VMM was launched in far 2007 and was designed to manage virtual machines and to get the most efficient physical server utilizations. It has been dramatically grown from the basic tool to the one of the most advanced tool, with abilities to work even with different type of clouds.

The new VMM 2016 allows you to create and manage private clouds, retain the characteristics of public clouds by allowing tenants and delegated VMM administrators to perform functions, and abstract the underlying fabric to let them deploy the VM's applications and services. Although they have no visibility into the underlying hardware, there is a uniform resource pooling which allows you to add or remove capacity as your environment grows. Additionally, it supports the new Windows Server 2016 capabilities including software-defined storage, networks and shielded VMs (simply put, Software-Defined Datacenters (SDDC's)). VMM 2016 can manage private clouds across supported hypervisors, such as Hyper-V and VMware, which can be integrated with Azure public cloud services as well.

The main strategies and changes of VMM 2016 are as follows:

  • Application focus: VMM abstracts fabric (hosts servers, storage, and networking) into a unified pool of resources. It also gives you the ability to deploy web applications and SQL Server profiles to configure customized database servers along with data-tier applications. However, virtual application deployment based on Server App-V, which was available in older versions of VMM, is no longer existing in VMM 2016. Although, if you upgrade VMM 2012 R2 to VMM 2016, your current service templates with Server App-V will continue to work with some limitations related to scale-out scenarios.
  • Service deployment: One of the powerful features of VMM is its capability to deploy a service to a private cloud. These services are dependent on multiple VMs tied together (for example, web frontend servers, application servers, and backend database servers). They can be provisioned as simply as provisioning a VM, but all together.
  • Dynamic optimization: This strategy will balance the workload in a cluster, while a feature called power optimization can turn off physical virtualization host servers when they are not needed. It can then turn them back on when the load increases. This process will automatically move VMs between hosts to balance the load. It also widens and replaces the VM Load Balancing feature that is available for Windows Server 2016 Failover Clusters.
  • Software-Defined Datacenter: Network virtualization (software-defined networking or simply SDN) was introduced in VMM 2012 SP1 and quickly became popular due to a possibility to define and run multiple isolated networks on a single physical network fabric. It was based on NVGRE abstraction mechanism. VMM 2016 goes beyond and brings Azure's network model closer to your datacenter by introducing network controller as a central point, VXLAN for abstraction from the underlying physical network and integration with software load-balancers and gateways. In addition to SDN, Windows Server 2016 features like Storage Spaces Direct (S2D), Storage Replica, and Quality of Service (QoS) complement each other and are also supported by VMM 2016.
  • Advanced Security: Modern data center requires protection for customer's sensitive data from hackers and even technical staff or other persons who can somehow access such data without your permission. To help protect against that problem, VMM supports managing and creating a new guarded fabric with a set of shielded VMs, guarded hosts and hosts with guardian services.
  • Multivendor hypervisor support: If we compare the list of managed hypervisors in VMM 2012 R2 to VMM 2016, it's been cut. VMM 2016 now manages only Hyper-V and VMware, covering all of the major hypervisors on the market so far. Support for Citrix XenServer has been removed:

Knowing your current environment – assessment

This is the first step. You need to do an assessment of your current environment to find out how and where the caveats are. You can use the Microsoft MAP toolkit (download it from http://www.microsoft.com/en-us/download/details.aspx?id=7826) or any other assessment tool to help you carry out a report assessment by querying the hardware, OS, application, and services. It is important to define what you can and need to address and, sometimes, what you cannot virtualize.

Microsoft MAP toolkit will assess your environment using agentless technology to collect data (inventory and performance), and provide reports. Server Consolidation Report, VMware Discovery Report, Microsoft Workload Discovery and Microsoft Private Cloud Fast Track Onboarding Assessment Report are some of the useful reports that will enable your IT infrastructure planning. For more information, refer to http://social.technet.microsoft.com/wiki/contents/articles/1640.microsoft-assessment-and-planning-toolkit.aspx.

Currently, Microsoft supports the virtualization of all MS infrastructure technologies
(for example, SQL
, Exchange, AD, Skype for Business, IIS, and File Server).

Designing the solution

With the assessment report in hand, it is recommended that you spend a reasonable amount of time on the solution design and architecture, and you will have a solid and consistent implementation. The following figure highlights the new VMM 2016 features and others, which have been carried over from older versions, for you to take into consideration when working on your private cloud design:

Creating the private cloud fabric

In VMM, before deploying VMs and services to a private cloud, you need to set up the private cloud fabric.

There are three resources that are included in the fabric in VMM 2016:

  • Servers: These contain virtualization hosts (Hyper-V and VMware servers) and groups, PXE, update servers (that is, WSUS), and other servers.
  • Networking: This contains the network fabric and devices configuration (for example, gateways, virtual switches, network virtualization); it presents the wiring between resource repositories, running instances, VMs, and services.
  • Storage: This contains the configuration for storage connectivity and management, simplifying storage complexities, and how storage is virtualized. For example, you can configure the SMI-S and SMP providers or a Windows 2016 SMB 3.0 file server.

If you are really serious about setting up a private cloud, you should carry out a virtualization assessment using MAP, as discussed above and work on a detailed design document covering hardware, hypervisor, fabric, and management. With this in mind, the implementation will be pretty straightforward.

System Center 2016 will help you install, configure, manage, and monitor your private
cloud from the fabric to the hypervisor and up to service deployment. It can also be integrated with public cloud services( for instance, Azure Site Recovery to protect and replicate your VMs to Azure public cloud).

Refer to the Designing the VMM server, database, and console implementation recipe in this chapter for further related information.

Understanding each component for a real-world implementation

System Center 2016 VMM has six components. It is important to understand the role of each component in order to have a better design and implementation.

Getting ready

For small deployments, test environments, or a proof of concept, you can install all of the components in one server, but as is best practice in production environments, you should consider separating the components.

How to do it...

Let's start by reviewing each component of VMM 2016 and understanding the role it plays:

  • VMM console: This application connects to the VMM management server to allow you to manage VMM, to centrally view and manage physical and virtual resources (for example, hosts, VMs, services, the fabric, and library resources), and to carry out tasks on a daily basis, such as VM and services deployment, monitoring, and reporting.

By using the VMM console from your desktop, you will be able to manage your private cloud without needing to remotely connect it to the VMM management server.

It is recommended to install the VMM console on the administrator desktop machine, taking into account the OS and prerequisites, such as a firewall and preinstalled software. See the Specifying the correct system requirements for a real-world scenario recipe in this chapter.
  • VMM management server: The management server is the core of VMM. It is the server on which the Virtual Machine Manager service runs to process commands and control communications with the VMM console, the database, the library server, and the hosts.

Think of VMM management server as the heart, which means that you need to design your computer resources accordingly to accommodate such an important service.

For high availability, VMM Management Server must be deployed as a HA service on a Windows Server Failover Cluster. Note though that the SQL Server where the VMM database will be installed and the file share for the library share must also be highly available. For more info, check Planning for high availability recipe in this chapter and the Installing a Highly Available VMM recipe in Chapter 4, Installing a Highly Available VMM Server.

As is the best practice for medium and enterprise production environments, keep the VMM management server on a separate cluster from the production cluster, due to its crucial importance for your private cloud.

  • Database: The database server runs SQL Server and contains all of the VMM data. It plays an important role when you have a clustered VMM deployment by keeping the shared data. The best practice is to also have the SQL database in a cluster or an availability group.
When running VMM in a cluster, you cannot install SQL Server in one of the VMM management servers. Instead, you will need to have it on another machine.
  • VMM library: The VMM library servers are file shares, a catalog that stores resources, such as VM templates, virtual hard drive files, ISOs, scripts, and custom resources with a .cr extension, which will all be visible and indexed by VMM and then shared among application packages, tenants, and self-service users in private clouds.

The library has been enhanced to support services and the sharing of resources.
It is a store for drivers for Bare Metal deployments, SQL data-tier apps, (SQLDAC), and web deploy packages.

In a distributed environment, you can group equivalent sets of resources and make them available in different locations by using resource groups. You can also store a resource in a storage group that will allow you to reference that group in profiles and templates rather than in a specific virtual hard disk (VHD); this is especially important when you have multiple sites and VMM will automatically select the right resource from a single reference object. This essentially enables one template that can reference an object that can be obtained from multiple locations.

You can also have application profiles and SQL profiles (answer files for configuration of the application or SQL) to support the deployment of applications and databases to a VM after the base image is deployed. Application profiles can be web applications, SQL data-tier, or a general for deploying both application types and running any scripts.

  • Self-service portal: The web-based self-service portal, was removed from SC 2012. In System Center 2012 SP1/R2, App Controller was being used as a replacement to the self-service portal, however, it was also finally removed in System Center 2016.
The Self-Service Portal's and App Controller's replacement is a Windows Azure Pack.
  • VMM command shell: VMM is based on PowerShell. Everything you can do on GUI, you can do by using PowerShell. VMM PowerShell extensions make available the cmdlets that perform all of the functions in VMM 2016.
When working with complex environments, or if you need to automate some processess, the PowerShell cmdlets will make your work easier. When doing wizard-based tasks on GUI, save the PowerShell script for future use and automation.

How it works...

As you may have noticed, although VMM management is the core, each component is required in order to provide a better VMM experience. In addition to this, for a real-world deployment, you also need to consider implementing other System Center family components to complement your design. Every System Center component is designed to provide part of the private cloud solution. The Microsoft private cloud solution includes the implementation of VMM 2016 plus the following utilities:

  • System Center 2016 Configuration Manager: This provides comprehensive configuration management for the Microsoft platform that can help users with the devices and applications they need to be productive while maintaining corporate compliance and control
  • System Center 2016 Data Protection Manager: This provides unified data protection for the Windows and also VMware environment, delivering backup and restore scenarios from disk, tape, off-premise, and from the cloud
  • System Center 2016 Endpoint Protection: This is built on the System Center Configuration Manager and provides threat detection of malware and exploits as part of a unified infrastructure for managing client security and compliance to simplify and improve endpoint protection
  • System Center 2016 Operations Manager: This provides deep application diagnostics and infrastructure monitoring to ensure the predictable performance and availability of vital applications, and offers a comprehensive view of the datacenter, private cloud, and public clouds
  • System Center 2016 Orchestrator: This provides the orchestration, integration, and automation of IT processes through the creation of runbooks to define and standardize best practices and improve operational efficiency
  • System Center 2016 Service Manager: This provides flexible self-service experiences and standardized datacenter processes to integrate people, workflows, and knowledge across enterprise infrastructure and applications

There's more...

When deploying System Center, there are some other systems and configurations you
need to consider. There are some old components that have also been described here in order to help you to understand your current infrastructure before, for instance, migration to the new VMM from older versions.

Windows Azure Pack

WAP is a free solution to manage resources that integrates with System Center and Windows Server to provide a customizable self-service portal for managing services such as websites, Virtual Machines, SQL or MySQL servers, and Service Bus; it also includes capabilities for automating and integrating additional custom services. For more info see http://www.microsoft.com/en-us/server-cloud/products/windows-azure-pack/.

Service Provider Foundation

Service Provider Foundation (SPF) is provided with System Center Orchestrator, a component of System Center since 2012 SP1. Service Provider Foundation exposes an extensible OData web service that interacts with Virtual Machine Manager (VMM). It's main interface for communication between WAP, SCOM, and VMM.

Service Reporting

Service Reporting, an optional component of System Center 2012 R2, enables IT (particularly hosting providers) to create detailed views, for each customer (tenant), of the virtual machine's consumption of the resources (CPU, memory, storage, and networking). For more info see http://technet.microsoft.com/en-us/library/dn251058.aspx.

Service Reporting has been removed in SC 2016 and is no longer available. Third-party solutions are recommended for billing and utilizing tracking purposes.

Domain controllers

Although the domain controller is not part of the System Center family and it is not a VMM component, it plays an important role in the deployment of a private cloud as VMM requires it to be installed on a domain environment.

This requirement is for the System Center VMM. You can have the managed hosts on a workgroup mode or even on a trusted domain other than the System Center domain. We will discuss this later in this chapter.

Windows Server Update Service – WSUS

WSUS plays an important role with reference to the private cloud as it is used to update the Hyper-V hosts, library servers, or any other role for compliance and remediation.

You can use WSUS for other System Center family components as well.

System Center App Controller

The App Controller provides a self-service experience through a web portal that can help you easily configure, deploy, and manage VMs and services across private, third-party hosters (that support Microsoft Hyper-V) and public clouds (Azure). For example, moving a VM from a private cloud to Azure, creating checkpoints, granting access, scaling out deployed services, and so on.

The App Controller has been used as a replacement of the VMM self-service portal since SC 2012 SP1. It was deprecated in the SC 2012 R2 time and finally removed in SC 2016. As noted above, you should plan Azure Pack deployment instead of current App Controller instance.

Microsoft Azure Stack

Azure Stack is a hybrid-cloud platform, bringing core public Azure services to your datacenter. These services are mostly dedicated to Azure PaaS and IaaS and help you out with building unified ecosystems between private and public clouds. Azure Stack is delivered as an integrated system, with software installed on the hardware built by partners like HPE and Cisco. Azure's familiar pay-as-you-go model is mainly being used in Azure Stack and you can stretch the same subscriptions out for both Azure and Azure Stack clouds. If you have unstable or restricted connection to Azure, you may choose to use Azure Stack in disconnected mode with a capacity model pricing package - a fixed fee annual subscription based on the number of physical cores. It's important to note that you can manage WAP VMs from Azure Stack using a special connector, though it's under review and not recommended for production use: https://aka.ms/wapconnectorazurestackdlc.

To try Azure Stack for free, you can use its development kit and Azure VM with nested virtualization enabled (this option is tested, but not actually supported) or your own physical resources for a single-server deployment. For more info see https://docs.microsoft.com/ru-ru/azure/azure-stack/azure-stack-run-powershell-script.

System Center components scenarios

The following table will guide you through choosing which System Center component is necessary as per your deployment:

Although Configuration Manager (SCCM) is not mentioned in the following table, it plays an important role when it comes to patching Virtual Machine and you can use SCCM Task Sequence (TS) on a single process to deploy an OS to a Virtual Hard Disk (VHD). For more info see http://technet.microsoft.com/en-us/library/dn448591.aspx.

You should also check Service Management Automation, which will enable Orchestrated offline VM Patching. For more info see http://blogs.technet.com/b/privatecloud/archive/2013/12/07/orchestrated-vm-patching.aspx.

Planning for high availability

High availability is important when your business requires minimum or no downtime, and planning for it in advance is very important.

Getting ready

Based on what we learned about each component, we now need to plan the high availability (HA) for each VMM component.

How to do it...

Start by planning the HA for the core component, followed by every VMM component of your design. It is important to consider hardware and other System Center components, as well as the OS and software licenses.

How it works...

When planning for highly available VMM management servers, you should first consider
where to place the VMM cluster. As per best practices, the recommendation is to install
the VMM cluster on a management cluster, preferably on some physical servers, if using converged network for your virtual network. However, if you plan to install highly available VMM management servers on the managed cluster, you need to take into consideration the following points:

  • Only one highly available VMM management server is allowed per Failover Cluster.
  • Despite the possibility to have a VMM management server installed on all cluster nodes, only one node can be active at a time.
  • To perform a planned failover, use Failover Cluster Manager. The use of the VMM console is not supported.
  • In a planned failover situation, ensure that there are no running tasks on the VMM management server, as it will fail during a failover operation and will not automatically restart after the failover operation.
  • Any connection to a highly available VMM management server from the VMM console will be disconnected during a failover operation, reconnecting right after.
  • The Failover Cluster must be running Windows Server 2016 in order to be supported.
  • The highly available VMM management server must meet system requirements. For information about system requirements for VMM, see the Specifying the correct system requirements for a real-world scenario recipe in this chapter.
  • In a highly available VMM management deployment, you will need a domain account to install and run the VMM management service. You are required to use distributed key management (DKM) to store the encryption keys in Active Directory.
  • A dedicated and supported version of Microsoft SQL Server should be installed. For supported versions of SQL Server for the VMM database, see the Specifying the correct system requirements for a real-world scenario recipe.

There's more...

The following sections are the considerations for SQL Server and the VMM library in an
HA environment.

SQL Server

In an enterprise deployment of VMM, it is recommended that you have a SQL Server cluster to support the HA VMM, preferably on a cluster separated from the VMM cluster. VMM 2016 supports SQL Server Always On Availability Groups. The following link will show you a good example of how to set it up: See the Configure SQL Server with AlwaysOn AGs recipe in Chapter 3, Installing VMM 2016.

Although the latest SQL Server versions support basic availability groups (AGs) available in Standard edition, SQL Server Enterprise and advanced AGs are recommended and will be used throughout the book.

VMM library

As it is the best practice in an enterprise deployment, a highly available file server for hosting the VMM library shares is highly recommended as VMM does not provide a method for replicating files in the VMM library, and they need to be replicated outside of VMM.

As a suggestion, you can use the Microsoft Robocopy tool to replicate the VMM library files if you have distributed the library type.

Designing the VMM server, database, and console implementation

When planning a VMM 2016 design for deployment, consider the different VMM roles, keeping in mind that VMM is part of the Microsoft private cloud solution. If you are considering a private cloud, you will need to integrate VMM with the other System
Center family components.

You can create application profiles that will provide instructions for installing Microsoft Web Deploy applications and Microsoft SQL Server data-tier applications (DACs), and for running scripts when deploying a virtual machine as part of a service.

In VMM, you can add the hardware, guest operating system, SQL Server, and application profiles that will be used in a template to deploy virtual machines. These profiles are essentially answer files to configure the application or SQL during the setup.

Getting ready

You can create a private cloud by combining hosts, even from different hypervisors
(for example, Hyper-V and VMware), with networking, storage, and library resources.

To start deploying VMs and services, you first need to configure the fabric.

How to do it...

Create a spreadsheet with the server names and the IP settings, as seen in the following table, of every System Center component you plan to deploy. This will help you manage and integrate the solution:

Server name

Role

IP settings

vmm-mgmt01

VMM Management Server 01

IP: 10.16.254.20/24

GW: 10.16.254.1

DNS: 10.16.254.2

vmm-mgmt02

VMM Management Server 02

IP: 10.16.254.22/24

GW: 10.16.254.1

DNS: 10.16.254.1

vmm-console01

VMM Console

IP: 10.16.254.50/24

GW: 10.16.254.1

DNS: 10.16.254.2

vmm-lib01

VMM Library

IP: 10.16.254.25/24

GW: 10.16.254.1

DNS: 10.16.254.2

w2016-sql01

SQL Server 2016

IP: 10.16.254.40/24

GW: 10.16.254.1

DNS: 10.16.254.2

How it works...

The following rules need to be considered when planning a VMM 2016 deployment:

  • The computer name cannot contain the character string SCVMM (for example,
    srv-scvmm-01) and cannot exceed 15 characters.
  • Your VMM database must use a supported version of SQL Server to perform a VMM 2016 deployment. Express editions of Microsoft SQL Server are no longer supported for the VMM database. For more information, check the system requirements specified in the Specifying the correct system requirements for a real- world scenario recipe in this chapter.
For a full highly available VMM, not only must VMM be deployed on a Failover Cluster (minimum two servers), but the SQL Server must be deployed on a cluster as well (minimum two servers).
  • VMM 2016 does not support a library server on a computer that is running Windows Server 2012; it now requires Windows Server 2012 R2 as a minimum, but for consistency and standardization, I do recommend that you install it on a Windows Server 2016.
  • VMM 2016 no longer supports creating and importing templates with the Server App-V packages. If you are upgrading from a previous version of VMM that has templates with such applications, you will continue to manage them with VMM, but you will not be able to upgrade the application.
  • Hosts running the following versions of VMware ESXi and VMware vCenter Server are supported:
    • ESXi 5.1
    • ESXi 5.5
    • ESXi 6.0
    • vCenter 5.1
    • vCenter 5.5
    • vCenter 6.0
  • Upgrading a previous version of VMM to a highly available VMM 2016 requires additional preparation. See Chapter 2, Upgrading from Previous Version of VMM, for this purpose.
  • If you're planning for high availability of VMM 2016, be sure to install SQL Server on a cluster and on separate servers as it cannot physically be located on the same servers as your VMM 2016 management server. In addition, AlwaysOn availability groups can be used for the VMM database.
  • The VMM management server must be a member of a domain. (This rule does not apply to the managed hosts, which can be on a workgroup.)
  • The startup RAM for the VMM management server (if running on a VM with dynamic memory enabled) must be at least 2048 MB.
  • VMM library does not support DFS Namespaces (DFSN) or DFS Replication (DFSR). This support is being planned.
  • VMM does not support file servers configured with the case-insensitive option for Windows Services for Unix, as the network filesystem case control is set to ignore. Refer to the Windows Services for UNIX 2.0 NFS Case Control article available at http://go.microsoft.com/fwlink/p/?LinkId=102944 to learn more.
  • The VMM console machine must be a member of a domain.

There's more...

For a complete design solution, there are more items you need to consider.

Storage providers – SMI-S and SMP

VMM provides support for both Block level storage (Fibre Channel, iSCSI, and Serial Attached SCSI (SAS) connections) and File storage (on SMB 3.0 network shares, residing on a Windows file server or on a NAS device).

By using storage providers, VMM enables discovery, provisioning, classification, allocation, and decommissioning.

Storage classifications enable you to assign user-defined storage classifications to discovered storage pools for Quality of Service (QoS) or chargeback purposes.

You can, for example, assign a classification of Gold to storage pools that have the highest performance and availability, Silver for high performance, and Bronze for low performance.

In order to use this feature, you will need the SMI-S provider.

VMM 2016 can discover and communicate with SAN arrays through the Storage Management Initiative (SMI-S provider) and Storage Management Provider (SMP) provider.

If your storage is SMI-S compatible, you must install the storage provider on a separately available server (do not install on the VMM management server) and then add the provider to VMM management. Some devices come with built-in SMI-S provider and no extra are tasks required in that case. If your storage is SMP-compatible, it does not require a provider installation either.

Each vendor has its own SMI-S setup process. My recommendation is to contact the storage vendor to ask for a Storage provider compatible with VMM 2016. A list of oficially supported storage arrays is available here: https://docs.microsoft.com/en-us/system-center/vmm/supported-arrays.

CIM-XML is used by VMM to communicate with the underlying SMI-S providers since VMM never communicates with the SAN arrays themselves.

By using the storage provider to integrate with the storage, VMM can create LUNs (both GPT and MBR) and assign storage to hosts or clusters.

VMM 2016 also supports the SAN snapshot and clone feature, allowing you to duplicate a LUN through a SAN Copy-capable template to provide for new VMs, if you are hosting those in a Hyper-V platform. You will need to provision outside of VMM for any other VMs hosted with VMware hosts, for example.

Bare metal

This capability enables VMM 2016 to identify the hardware, install the operational system (OS), enable the Hyper-V or file server role, and add the machine to a target-host group with streamlined operations in an automated process.

As of SC 2016, deploying a bare metal Hyper-V cluster is now a single step. Furthermore, additional cluster hosts can be added to an existing Hyper-V or SOFS cluster using bare metal deployment.

PXE capability is required and is an integral component of the server pool. The target server will need to have a baseboard management controller (BMC) supporting one of the following management protocols:

  • Data Center Management Interface (DCMI) 1.0
  • Systems Management Architecture for Server Hardware (SMASH) 1.0
  • Intelligent Platform Management Interface (IPMI) 1.5 or 2.0
  • Custom protocols such as HPE Integrated Lights-Out (iLO) or Integrated Dell Remote Access (iDRAC)

Enterprise and hosting companies will benefit from the ability to provide new Hyper-V servers without having to install the operational system manually on each machine. By using BMC and integrating with Windows Deployment Services (WDS), VMM deploys the OS to designated hosts through the boot from the VHD(X) feature. The right BMC configuration presence is also a requirement for one of the most interesting features, called OS Rolling Upgrade, which will be discussed in detail later.

Configuring security

To ensure that users can perform only assigned actions on selected resources, create tenants, self-service users, delegated administrators, and read-only administrators in VMM using the VMM console, you will need to create Run As accounts to provide necessary credentials for performing operations in VMM ( example, for adding hosts).

Run As accounts in VMM

Run As accounts are very useful additions to enterprise environments. These accounts are used to store credentials that allow you to delegate tasks to other administrators and self-service users without exposing sensitive credentials.

By using Windows Data Protection API (DPAPI), VMM provides OS-level data protection when storing and retrieving the Run As account.

There are several different categories of Run As accounts:

  • Host computer: This is used to provide access to Hyper-V and VMware ESXi hosts
  • BMC: This is used to communicate with BMC on the host computer,
    for out-of-band management or power optimization
  • Network device: This is used to connect to network load balancers
  • Profile: This is to be used for service creation in the OS and application profiles as well as SQL and host profiles
  • External: This is to be used for external systems such as System Center
    Operations Manager

Only administrators or delegated administrators can create and manage Run As accounts.

During the installation of the VMM management server, you will be requested to use distributed key management (DKM) to store encryption keys in Active Directory Domain Services (AD DS).

Communications poand protocols for firewall configuration

When designing the VMM implementation, you need to plan which ports you are going to use for communication and file transfers between VMM components. Based on the chosen ports, you will also need to configure your host and external firewalls. See the Configuring ports and protocols on the host firewall for each SCVMM component recipe in Chapter 3, Installing VMM 2016.

Not all of the ports can be changed through VMM. Hosts and library servers must have access to the VMM management server on the ports specified during setup. This means that all firewalls, whether software-based or hardware-based, must be previously configured.

VM storage placement

The recommendation is to create a big CSV volume. CSV spreads across multiple disk spindles and it will give great storage performance for VMs, as opposed to creating volumes based on the VHD purpose (for example, OS, data, and logs).

If Storage Spaces Direct is used, It's recommended to make the number of volumes a multiple of the number of servers in your cluster. For example, if you have 4 servers, you will experience more consistent performance with 8 total volumes than with 7 or 9.

Management cluster

VMM 2016 supports management up to 1000 physical hosts and 25000 VMs. Therefore, the best practice is to have a separate management cluster with running VMM components to manage the production, test, and development clusters.

In addition to this, although you can virtualize the domain controllers with Windows 2016, it is not the best practice to have all the domain controllers running on the management clusters, as the cluster and System Center components highly depend on the domain controllers. If it's possible, place one or more DCs on the physical hosts or VMs in the location or fault domains different from the management cluster.

The following figure shows a two-node hyper-converged management cluster, with System Center 2016 components installed in separate VMs to manage the production cluster. All hosts are running on Windows Server 2016 with enabled Storage Spaces Direct to provide hyper-converged solutions which help to maximize the server's efficiency and reduce overall costs:

Small environment

In a small environment, you can have all the VMM components located on the same server. A small business may or may not have high availability in place, as VMM 2016 is now a critical component for your private cloud deployment.

Start by selecting the VMM server's location, which could be a physical server or a
virtual machine.

You can install SQL Server on the VMM server as well, but as VMM 2016 does not support SQL Express editions, you will need to install SQL Server first and then proceed with the VMM installation.

If you are managing more than 10 hosts in the production environment, my recommendation would be to have SQL Server running on a separate machine.

It is important to understand that when deploying VMM in production environments (real-world scenarios), the business will require a reliable system that it can trust.

The following figure illustrates a real-world deployment where all VMM 2016 components are installed on the same VM and SQL is running on a separate VM.

Note though that this deployment won't allow for converged network if no dedicated network adapter is provided for VMM Management.

Lab environments

I would recommend up to 50 hosts in a lab environment with SQL Server and all VMM components installed on a single VM. It will work well, but I would not recommend this installation in a production environment.

Alternatively, you can leverage a nested virtualization feature in Windows Server 2016. In other words, with nested virtualization, a Hyper-V host itself can be virtualized, so you can make your lab on a single host. Using VMM 2016, you can add a vritualized Hyper-V host to the fabric and manage VMs running on the host. However, a true support of nested virtualization is available only in VMM 1801 semi-annual channel release (for example, enabling and disabling nested virtualization on the VM through VMM console)

Medium and enterprise environments

In a medium-scale or large-scale environment, the best practice is to split the roles across multiple servers or virtual machines. By splitting the components, you can scale out and introduce high availability to the System Center environment.

In the following design, you can see each component and what role it performs in the System Center Virtual Machine Manager environment:

When designing an enterprise private cloud infrastructure, you should take into consideration some key factors such as business requirements, company policies, applications, services, workloads, current hardware, network infrastructure, storage, security, and users.

Private cloud sample infrastructure

Following is a sample of a real-world infrastructure that can support up to 3000 VMs and 64 server nodes running Windows 2016 Hyper-V.

The number of VMs you can run on an implementation like this will depend on some key factors. Do not take the following configuration as a mirror for your deployment, but as a starting point. My recommendation is to start understanding the environment, then run a capacity planner such as a MAP toolkit. It will help you gather information that you can use to design your private cloud.

I am assuming a ratio of 50 VMs per node cluster with 3 GB of RAM, configured to use Dynamic Memory (DM):

  • Servers
    • 64 servers (4 clusters x 16 nodes)
    • Dual processor, 6 cores: 12 cores in total
    • 192 GB RAM
    • 2 x 146 GB local HDD (ideally SDD) in Raid 1
  • Storage
    • Switch and host redundancy
    • Fiber channel or iSCSI or S2D (converged)
    • Array with capacity to support customer workloads
    • Switch with connectivity for all hosts.
  • Network
    • A switch with switch redundancy and sufficient port density and connectivity to all hosts.
    • It provides support for VLAN tagging and trunking.
    • NIC Team and VLAN are recommended for better network availability, security, and performance achievement.
  • Storage connectivity
    • If it uses a fiber channel: 2 (two) x 4 GB HBAs
    • If it uses ISCSI: 2 (two) x dedicated NICs (recommended 10 GbE)
    • If it uses S2D: 2 (two) x dedicated 10Gbps NICs (recommended RDMA-capable adapters)
  • Network connectivity
    • If it maintains a 1 GbE connectivity: 6 dedicated 1 GbE (live migration, CSV, management, virtual machines' traffic)
    • If it maintains a 10 GbE connectivity: 3 dedicated NICs 10 GbE
      (live migration, CSV, management, virtual machines' traffic)
Another way to build private cloud infrastructure is to use hyper-converged solution in which all Storage Spaces Direct, Hyper-V, Failover Clustering and other components are configured on the same cluster hosts. In this model, storage and compute resources cannot be scaled up separately (adding one more host to an existing cluster will extend both compute and storage resources). There are also some requirements for the IT staff who have to carefully plan any management tasks on each storage and compute subsystem to eliminate any possible downtimes. To avoid all these disadvantages and for larger deployments, I'd recommend using a converged solution with separate clusters for SOFS and Hyper-V workloads.

Hosting environments

System Center 2012 SP1 VMM introduced multi-tenancy. This is one of the most important features for hosting companies as they only need to install a single copy of System Center VMM, and then centralize their customer management, each one running in a controlled environment in their own domain. Hosters always want to maximize their compute capacity and VLAN segment hardware so you can't maximize its capacity. Network virtualization moves the isolation up to the software stack, enabling the hoster to maximize all capacity and isolate customers via software-defined networking
VMM 2012 R2 takes advantage of Windows Server 2012 R2 features, VMM 2012 R2 delivers Site-to-Site NVGRE gateway for Hyper-V network virtualization. This capability enables you to use network virtualization to support multiple Site-to-Site tunnels and direct access through a NAT Firewall. The networking virtualization (NV) uses NVGRE protocol, allowing network load balancers to act as NV gateways. Plus, switch extensions can make use of NV policies to interpret the IP information in packets being sent and communication between, for example, Cisco switches and VMM 2012 R2.

New networking features in VMM 2016

VMM 2016 and Windows Server 2016 continue to improve Hyper-V Network-Virtualization (HNV) and helps you move to an efficient SDDC solution. VMM 2016 introduces flexible encapsulation which supports both NVGRE (HNVv1) and new VXLAN (HNVv2) to create overlay networks in which original packets from VMs with its MACs, IPs and other data (Customer Address network) are placed inside an IP packet on the underlying physical network (Provider Address network) for further transportation. VXLAN is the default in VMM 2016 and works in MAC distribution mode. It uses a new Network Controller (NC) as a central management point that communicates with Hyper-V hosts and pushes network policies down to NC host agents running on each host. In short, NC is responsible for the address mapping, and the host agents maintain the mapping database. NC also integrates with Software-Load Balancer (L3 and L4), network layer datacenter firewall and RAS gateways which are also included in Windows Server 2016. Consequently, NC is the heart of SDN in VMM 2016 and should always be considered in a cluster configuration.

Thanks to nested virtualization in Windows Server 2016 (an ability to run Hyper-V server inside a VM), you can evaluate SDN and other scenarios using just one physical machine. The good example of SDN evaluation is available at https://blogs.msdn.microsoft.com/excellentsge/2016/10/06/deploying-sdn-on-one-single-physical-host-using-vmm/.

There is also a new way of deploying converged networking that has been introduced in Windows Server 2016 and VMM 2016 to ease and improve SDN deployment. Switch-Embedded Teaming (SET) allows you to group up to eight identical adapters into one or more software-based virtual adapters. Prior to VMM 2016 you needed to have two different sets of adapters: one to use with traditional teaming and the one to use with RDMA because of its incompatibility with teaming and virtual switch. SET eliminates this limitation and supports RDMA convergence as well as QoS, RSS, VMQ, and both versions of HNV noted earlier. Furthermore, creating a general Hyper-V virtual switch with RDMA NICs would be also supported:

New storage features in VMM 2016

When we discussed possible architectures for management clusters, I referred to a new feature in Windows Server 2016 and VMM 2016, Storage Spaces Direct (S2D). S2D uses industry-standard servers with local storage which could be direct-attached enclosures or internal disks. S2D provides similar shared storage pools across cluster nodes by leveraging Cluster Shared Volume, Storage Spaces, Failover Clustering and SMB3 protocol for file access (SOFS). Hyper-converged and converged solutions can now be based on software-defined storage running on Windows Server 2016. So, you have a choice: to buy external enterprise SAN or to use S2D. If your goal is a software-defined datacenter, the answer to all questions is very clear - S2D and SDN implementation. The main competitor to S2D is a well-known VMware Virtual SAN (vSAN) that was first released in vSphere 5.5 and is still present in the newest vSphere 6.6. S2D, just like a vSAN, has special licensing requirements.

S2D is not available in Windows Server 2016 Standard edition and would require the most expensive Datacenter edition.

Furthermore, improved Storage QoS in VMM 2016 provides a way to centrally monitor and manage storage performance for virtual machines residing on S2D or another device. Storage QoS was first introduced in 2012 R2 version. You could set maximum and minimum IOPS thresholds for virtual hard disks (excluding shared virtual hard disks). It worked well on standalone Hyper-V hosts, but if you have a cluster with a lot of virtual machines or even tenants, it could be complicated to achieve the right QoS for all cluster resources. The feature automatically improves storage resource fairness between multiple virtual machines using the same file server cluster. In other words, QoS for storage will be distributed between a group of virtual machines and virtual hard disks:

Another feature available only in Windows Server 2016 Datacenter edition is Storage Replica (SR). Previously, we needed to find third-party solutions for SAN-to-SAN replication. And building stretched clusters required a huge amount of money. Windows Server 2016 and VMM 2016 can help to significantly reduce costs and enhance unification in such scenarios. SR is the main component of multi-site clusters or disaster recovery solutions supporting both asynchronous and synchronous replication between any storage devices, including Storage Spaces Direct. Also, you are not required to have identical devices on both sides. However, at the time of writing, only synchronous replication is supported in VMM fabric, and deployment is limited to PowerShell.

Undoubtedly, this is not a final list of new features. Since VMM 2016 is compatible with Windows Server 2016 that brings a lot of major and minor updates in Hyper-V, Failover Clustering and Security, they are also covered in later chapters. New features of VMM 1801 semi-annual channel release will also be briefly covered in next chapters.

See also

For more information, see the following references:

Specifying the correct system requirements for a real-world scenario

In a real-world production environment, you need to specify a system according to the design and business requirements.

Getting ready

When specifying the hardware for your private cloud deployment, take into consideration future growth needs. It is also important to apply the latest OS and software updates.

How to do it...

Use the following tables to carry out an extensive documentation of the hardware and software requirements for your deployment.

Create a document that outlines every solution component, describing the system requirements, before starting to implement.

How it works...

The following table shows the supported OS and servers for SC 2016:

Hardware requirements

Following are the hardware requirements to consider when specifying your VMM environment. Although for SMB, POC or demo scenarios you can have SQL installed on the VMM management server, the recommendation is to have SQL Server installed on another server. And you also won't run SQL and Library Servers on the VMM server if you want to manage more than 150 hosts.

Following are the hardware requirements for VMM management server:

Following are the hardware requirements for VMM database server:

Following are the hardware requirements for VMM library server.

The minimum and recommended requirements for a VMM library server will be determined by the quantity and size of the files that will be stored:

Following are the hardware requirements for the VMM console:


Following are the hardware requirements for the Windows Azure Pack.

Before the WAP installation, you need to consider which type of deployment and components you really need. In an express deployment, all core components are installed on the same machine. This type of deployment is recommended for demo and POC scenarios. Distributed deployment is when WAP portals and databases are running on dedicated virtual machines (up to 8, except for VMs for optional resource providers like VM Clouds or Web Sites):

Software requirements

Following are the requirements for VMM management server for SC 2016:

Software Requirement

Notes

Microsoft .NET Framework .NET 4.6

Included in Windows Server 2016

Microsoft .NET Framework 4.6 is available at https://www.microsoft.com/en-us/download/details.aspx?id=53344

Windows Assesment and Deployment Kit (ADK)

To install the Windows ADK, you need to use the package from https://developer.microsoft.com/en-us/windows/hardware/windows-assessment-deployment-kit

Important:

You only need to download and install Deployment Tools and Windows Preinstallation Environment options on the VMM server

A supported version of SQL Server (if you're installing SQL on the VMM management server)

See the table for the supported OS's and servers for SC 2016

SQL Server Command Line Utilities

These utilities are required if you plan to deploy services that use SQL Server data-tier applications. You need to download them from the feature pack with the same version as installed SQL Server has.

For example, SQL Server 2014 feature pack is available at

https://www.microsoft.com/download/details.aspx?id=42295

Note: If you do not install these utilities, this will not block the installation.

PowerShell 5.0

Included in Windows Server 2016

 

The following table shows the requirements for the VMM console:

Software requirement

Notes

Windows PowerShell 4.0, 5.0

Included in Windows Server 2012 R2/2016 and Windows 8.1/10

At least Microsoft .NET Framework 4.5

On a computer running Windows 8.1 .NET 4.5.1 is built-in

On a computer running Windows 10 .NET has 4.6 version by default and no actions will be required

If for some reason, .NET is not installed by default, the VMM setup will install it.

Following are the requirements for core WAP components:

Software requirement

Notes

Microsoft Web Platform Installer 4.6 or later

Required for download and installation WAP components

Available at https://www.microsoft.com/web/downloads/platform.aspx

IIS 8.0, 8.5, 10

Built-in in Windows Server 2012 R2/2016. WAP wizard configures IIS automatically during setup.

Microsoft .NET Framework 3.5 Service Pack (SP) 1

Available but not installed in Windows Server 2012 R2/2016 by default. The package can also be download at https://www.microsoft.com/ru-ru/download/details.aspx?id=22

.NET 4.5 Extended, with ASP.NET for Windows 8

WAP wizard checks and installs automatically.

See also

For more information, see the following references:

Licensing the System Center

System Center 2016 is licensed with two versions, Standard and Datacenter. As with System Center 2012 R2, the same capabilities across editions are differentiated only by virtualization rights. All System Center components are included in these two editions. The main difference between SC 2012 R2 and SC 2016 is the licensing model that has been moved from CPU-based to core-based in order to simplify licensing across multi-cloud infrastructures.

Getting ready

The license is required only to manage endpoints. If you have existing software-assurance (SA) subscription, you can move to the new SC 2016 at any time. SC 2-processor licenses with active SA will be exchanged for a minimum of 8 two-core pack licenses (16 cores) or the actual number of physical cores in use on the server under management.

How to do it...

How it works...

License summary for System Center 2016:

  • Core-Based licensing: Licensing is based on the number of physical cores on the servers under management, consistent with the Windows Server 2016 model. You need to license all physical cores in the server being managed. Minimum of 8 cores licenses is required for each processor and minimum of 16 cores required for each server. If you have, for example, even one 4-core CPU in server, it would be required to buy eight 2-core packs to license that server. The price of eight two-core packs will be the same as 2-processor licenses for SC 2012 R2.
  • Consistent licensing model across editions: Core-based licenses for server management. User-based or operating system environment (OSE)-based license for client management.
  • For endpoints being managed: No additional licenses are needed for management servers or SQL Server technology used in the System Center:

System Center 2016 Editions

Datacenter

Standard

Recommendation

For highly virtualized environments

For lightly- or non-virtualized environments

Virtualization rights

Unlimited

2 (two) OSEs

Capabilities

All SC components and all workload types

All SC components and all workload types

License type

one license pack covers 2 cores, minimum of 8 packs required for each server

one license pack covers 2 cores, minimum of 8 packs required for each server

Troubleshooting VMM and supporting technologies

This recipe will take you through the process of troubleshooting VMM and its supporting technologies for a successful VMM deployment.

Getting ready

Having an understanding of the core technologies that VMM depends on to work correctly is the initial step to troubleshooting VMM:

  • WS Management (WinRM)
  • WMI
  • BITS
  • DCOM
  • WCF

Troubleshooting is never an easy task, but VMM 2016 provides tools and ways to help you find and remediate an issue.

How to do it...

Following are some techniques you can use to troubleshoot:

  • Event logs

A good starting point is to look at the event logs. Look for OS- and VMM-related errors or failures. A problem with the operating system (OS) or one of its core services could result or lead to a problem in VMM.

For example, if you are running SQL Server on the same server and it did not start, VMM management service will not start either and VMM operations will fail as a direct result of this. You can easily find this by looking for errors in the system or application logs, errors that would indicate, in this example, that the service is not running (for this example, you can also check Services.msc).

  • VM manager log

When looking for VMM errors, it is recommended that you to look at the VMM log as well. To do so, perform the following steps on the VMM running Windows Server 2016:

    1. On the Server Manager window, click on Tools
    2. Select Event Viewer, expand Applications and Services logs, then go to the Microsoft and select the VirtualMachineManager log
  • VMM installation-related troubleshooting logs

VMM records information about the VMM agent installation. However, if the installation logging is not sufficient to determine the cause of failure, you can enable tracing by using the VMM MPS Reports tool and then restart the installation.

  • VMM server setup logging

Installation logs are written, by default, to the C:\ProgramData\VMMLogs
hidden folder

  • VMM agent installation logging

When installing an MSI package, such as installing the VMM agent manually, you can enable logging using the following syntax:

        msiexec /I MSIPackageName.msi  /L*V path\logfilename.log 

For example, using the syntax, we can come up with something like the
following command:

        msiexec /I "C:\setup\vmmAgent.msi" /L*V vmmagent.log 

The local agent installation information is logged in the C:\ProgramData\VMMLogs hidden folders.

Look for the logfile vmmAgent.msi_m-d-yyy_hh-mm-dss.log.

In logs, it is common to see errors shown as Carmine errors. Carmine was a VMM project code name during its development process.
  • Troubleshooting WinRM

To check if WinRM has remote access, check if:

    • The SID in RootSDDL maps to the VMM Servers local group on each Hyper-V host
    • The local group contains the account that VMM management service runs as a service

How it works...

A good understanding of what a successful installation log contains from a POC or a pilot environment is important to identify possible issues, especially if it appears when deploying VMM on a production environment, as you can then compare both logs.

There's more...

Run the following command on the Hyper-V host:

winrm id 

This should produce an output similar to the following output:

IdentifyResponse
ProtocolVersion = http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor = Microsoft Corporation
ProductVersion = OS: 10.0.14393 SP: 0.0 Stack: 3.0
SecurityProfiles
SecurityProfileName = http://schemas.dmtf.org/wbem/wsman/1/wsman/secprofile/http/spnego-kerberos

If the result shows an error, run the following command for a quick configuration of WinRM:

winrm qc 

If prompted, answer Yes. You will receive a response like the following:

WinRM already is set up to receive requests on this machine. 
WinRM is not set up to allow remote access to this machine for management. 
The following changes must be made: 
Enable the WinRM firewall exception
Make these changes [y/n]? WinRM has been updated for remote management. WinRM firewall exception enabled. WinRM can now be tested again by typing 'winrm id' as before

Now check the listener:

winrm enum winrm/config/listener 

Run the following command on the VMM management server:

winrm id -r:http://HyperVHost.yourdomain.local:5985 -u:YOURDOMAIN\AdminUser 

The result will be similar to the following:

IdentifyResponse
ProtocolVersion = http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd
ProductVendor = Microsoft Corporation
ProductVersion = OS: 10.0.14393 SP: 0.0 Stack: 3.0

Otherwise you will receive the following error:

Error number: -2144108526 0x80338012 
The Client cannot connect to the destination specified in the request 

This could indicate communication issues, so check your network, host firewall, and connectivity.

Most WinRM-related events appear in the system or application event logs. The Service Control Manager often contains the error, as the WinRM service has terminated or restarted for some reason.

To avoid this scenario, conduct the following checks:

  • Make sure you installed all of the prerequisites
  • Check the firewall rules and make sure the ports are configured correctly
  • Open the command prompt (Run as Administrator) and type the following command:
      winrm qc -q 
      winrm set winrm/config/service/auth @{CredSSP="True"} 
      winrm set winrm/config/winrs @{AllowRemoteShellAccess="True"} 
      winrm set winrm/config/winrs @{MaxMemoryPerShellMB="2048"} 

Verifying WMI providers

You can check if the WinRM can communicate with OS WMI providers by running the
following command:

winrm enum wmi/root/cimv2/Win32_ComputerSystem -r :http://servername:5985 [-u:YOURDOMAIN\AdminUser] 

By running the following command, you can check if the WinRM can communicate with Hyper-V WMI providers:

winrm enum wmi/root/virtualization/v2/msvm_computersystem  
  -r:http://servername:5985 [-u:YOURDOMAIN\AdminUser] 

Also, to check if the WinRM can communicate with the VMM agent WMI provider, run the following command:

winrm invoke GetVersion wmi/root/scvmm/AgentManagement -r:servername [-u:YOURDOMAIN\AdminUser] @{} 
 
If you are using VMM services, do not remove and re-add the host. Instead, evacuate the host before removing or, on the host, uninstall and then re-install the agent manually, then reassociate it in VMM.

Troubleshooting tools

Following are the troubleshooting tools available for use:

  • Windows Management Instrumentation Tester (wbemtest.exe)
    • The wbemtest.exe gives you the ability to query WMI namespaces on local or remote servers.
    • Connecting to a namespace locally indicates that it is properly registered and accessible via the WMI service. By connecting to a remote server additionally, it also indicates that WMI connectivity between the two machines is working.
  • WMI Service Control Utility
    • This tool configures and controls the WMI service, allowing namespace permissions to be modified.
    • To open this tool, in the command prompt type the following:
              wmimgmt.msc
    • Then perform the following steps:
      1. Right-click on WMI Control (Local)
      2. Select Properties
      3. Click on the Security tab and then select Root
      4. Click on the security button to check the permissions

Background Intelligent Transfer Service (BITS) troubleshooting

BITS transfers files between machines, providing information about the operation's progress. The transfer can be asynchronous.

In VMM, BITS is used for encrypted data transfer between managed computers. Encryption is done by using a self-signed certificate generated when the Hyper-V host is added to VMM.

You can use BITSadmin to verify that BITS is working properly outside of VMM.

BITSadmin is available in Windows Server. Some useful examples of BITSadmin are described at: http://msdn.microsoft.com/en-us/library/aa362812(VS.85).aspx.

BTSadmin is deprecated in Windows Server 2016. Administrative tools for the BITS service are now provided by the PowerShell module BitsTransfer:
  • Add-BitsFile
  • Complete-BitsTransfer
  • Get-BitsTransfer
  • Remove-BitsTransfer
  • Resume-BitsTransfer
  • Set-BitsTransfer
  • Start-BitsTransfer
  • Suspend-BitsTransfer

Data collection tools

The following tools are used to collect data surrounding VMM issues:

  • VMM tracing tools: VMM tracing tools provide the ability to manage, collect, and view various traces and diagnostic information in a VMM environment:
  • Gathering trace information: When you face an issue and need to report it to Microsoft, you can gather the trace by performing the following steps:
    1. In the VMM server, open the command prompt with administrative rights and type the following command:
logman create trace VMMDebug -v mmddhhmm -o
$env:SystemDrive\VMMlogs\DebugTrace_$env:computername.ETL
-cnf 01:00:00 -p Microsoft- VirtualMachineManager-Debug
-nb 10 250 -bs16 -max 512
    1. Start the trace collection by executing the following command:
logman start VMMDebug 
    1. Next, try to reproduce the issue, and at the end stop the trace collection by executing the following command:
              logman stop VMMDebug  
    1. Send the ETL file located in %SystemDrive%\VMMlogs\DebugTrace_%computername%.ETL to Microsoft.
    2. Delete the debug information by executing the following command:
              logman delete VMMDebug

After gathering the trace, you can use netsh trace convert command on the traces. This command converts the ETL binary trace logs into TXT files that can be viewed in any text editor.
To convert the ETL file:

  1. Run CMD or PowerShell with administrative privileges.
  2. Start conversions by executing the following command:
      nets  trace convert C:\VMMlogs\yourfilename.etl

You will receive a response like the following:

       Input file: C:\VMMlogs\VMMLog_VMM01_09242130.etl
Dump file: C:\VMMlogs\VMMLog_VMM01_09242130.txt
Dump format: TXT
Report file: -
Generating dump ... done
  1. Open the generated TXT-file in Notepad by using the following command:
      notepad c:\VMMlogs\yourfilename.txt

See also

  • Configuring ports and protocols on the host firewall for each SCVMM component recipe in Chapter 3, Installing VMM 2016

Left arrow icon Right arrow icon

Key benefits

  • •Implement cost-effective virtualization solutions for your organization with actionable recipes
  • •Explore the concepts of VMM with real-world use cases
  • •Use the latest features with VMM 2016 such as Cluster OS Rolling Upgrade, Guarded Fabric and Storage Spaces Direct

Description

Virtual Machine Manager (VMM) 2016 is part of the System Center suite to configure and manage datacenters and offers a unified management experience on-premises and Azure cloud. This book will be your best companion for day-to-day virtualization needs within your organization, as it takes you through a series of recipes to simplify and plan a highly scalable and available virtual infrastructure. You will learn the deployment tips, techniques, and solutions designed to show users how to improve VMM 2016 in a real-world scenario. The chapters are divided in a way that will allow you to implement the VMM 2016 and additional solutions required to effectively manage and monitor your fabrics and clouds. We will cover the most important new features in VMM 2016 across networking, storage, and compute, including brand new Guarded Fabric, Shielded VMs and Storage Spaces Direct. The recipes in the book provide step-by-step instructions giving you the simplest way to dive into VMM fabric concepts, private cloud, and integration with external solutions such as VMware, Operations Manager, and the Windows Azure Pack. By the end of this book, you will be armed with the knowledge you require to start designing and implementing virtual infrastructures in VMM 2016.

Who is this book for?

If you are a solutions architect, technical consultant, administrator, or any other virtualization enthusiast who needs to use Microsoft System Center Virtual Machine Manager in a real-world environment, then this is the book for you.

What you will learn

  • Plan and design a VMM architecture for real-world deployment
  • Configure fabric resources, including compute, networking, and storage
  • Create and manage Storage Spaces Direct clusters in VMM
  • Configure Guarded Fabric with Shielded VMs
  • Create and deploy virtual machine templates and multi-tier services
  • Manage Hyper-V and VMware environments from VMM
  • Enhance monitoring and management capabilities
  • Upgrade to VMM 2016 from previous versions
Estimated delivery fee Deliver to Denmark

Premium delivery 7 - 10 business days

€17.95
(Includes tracking information)

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Feb 21, 2018
Length: 562 pages
Edition : 3rd
Language : English
ISBN-13 : 9781785881480
Vendor :
Microsoft

What do you get with Print?

Product feature icon Instant access to your digital eBook copy whilst your Print order is Shipped
Product feature icon Paperback book shipped to your preferred address
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Shipping Address

Billing Address

Shipping Methods
Estimated delivery fee Deliver to Denmark

Premium delivery 7 - 10 business days

€17.95
(Includes tracking information)

Product Details

Publication date : Feb 21, 2018
Length: 562 pages
Edition : 3rd
Language : English
ISBN-13 : 9781785881480
Vendor :
Microsoft

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 141.97
System Center 2016 Virtual Machine Manager Cookbook
€41.99
Microsoft System Center 2016 Service Manager Cookbook
€49.99
Windows Server 2016 Hyper-V Cookbook
€49.99
Total 141.97 Stars icon
Banner background image

Table of Contents

11 Chapters
VMM 2016 Architecture Chevron down icon Chevron up icon
Upgrading from Previous Versions Chevron down icon Chevron up icon
Installing VMM 2016 Chevron down icon Chevron up icon
Installing a Highly Available VMM Server Chevron down icon Chevron up icon
Configuring Fabric Resources in VMM Chevron down icon Chevron up icon
Configuring Guarded Fabric in VMM Chevron down icon Chevron up icon
Deploying Virtual Machines and Services Chevron down icon Chevron up icon
Managing VMware ESXi hosts Chevron down icon Chevron up icon
Managing Clouds, Fabric Updates, Resources, Clusters, and New Features of VMM 2016 Chevron down icon Chevron up icon
Integration with System Center Operations Manager 2016 Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
(6 Ratings)
5 star 66.7%
4 star 0%
3 star 16.7%
2 star 0%
1 star 16.7%
Filter icon Filter
Top Reviews

Filter reviews by




Alexander Apr 03, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I like that author showed alot of PowerShell and automation, converged networks desription, server clustering and storage examples based on real world experience. First chapters little overloaded, because showed almost all possible scenarios of VMM deployment and upgrade. I'm very excited about shielded VMs in Chapter 6. Finally, I understood how to configure them! In my opinion this book is the best edition in the series.
Amazon Verified review Amazon
P C (utilizador de Portugal) Mar 11, 2021
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Una excelente revisión de los conceptos fundamentales de trabajar con SCVMM 2016
Amazon Verified review Amazon
Alexander Jul 02, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
I appreciate to get this book as my desk book. It's very useful if you doesn't work with VMM every day. Good structure for every feature: good overview, how to do it step by step, where to get more information. Moreover the book provide all information about guarded fabric in VMM which you can use to increase security in your project. Plus, all information provided by simple language. I would like to recommend the book for guys who start to learn VMM or who doesn't work with VMM every day.
Amazon Verified review Amazon
Michael Feb 27, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
The best SCVMM Book on the market, written by the best SCVMM Tech Pros out there.
Amazon Verified review Amazon
Shane Dhunwerq Jul 12, 2018
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
Great read but hard to follow in some instances. There are lab exercises that I just could not perform by following the instructions in the book. One of the biggest problems is that this hard copy book has instructions that assumes the book is digital, like on page 101 when it asks you to "Open notepad and copy the following into a new file" then gives you a script for automating sql server deployment... Of course I installed SQL by clicking around.Then there is page 224 on deploying a network controller. I am looking at the script and SVC01\Root-CA just conveniently pops up out of nowhere. Of course I re-typed the script and ran it, (I created my own CA), but did not get very far... this was not very helpful. Overall, the book is very informative but too often omits the seemingly minor details that are crucial to the success of a lab. I am still in search of another book to supplement this one.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is the delivery time and cost of print book? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela
What is custom duty/charge? Chevron down icon Chevron up icon

Customs duty are charges levied on goods when they cross international borders. It is a tax that is imposed on imported goods. These duties are charged by special authorities and bodies created by local governments and are meant to protect local industries, economies, and businesses.

Do I have to pay customs charges for the print book order? Chevron down icon Chevron up icon

The orders shipped to the countries that are listed under EU27 will not bear custom charges. They are paid by Packt as part of the order.

List of EU27 countries: www.gov.uk/eu-eea:

A custom duty or localized taxes may be applicable on the shipment and would be charged by the recipient country outside of the EU27 which should be paid by the customer and these duties are not included in the shipping charges been charged on the order.

How do I know my custom duty charges? Chevron down icon Chevron up icon

The amount of duty payable varies greatly depending on the imported goods, the country of origin and several other factors like the total invoice amount or dimensions like weight, and other such criteria applicable in your country.

For example:

  • If you live in Mexico, and the declared value of your ordered items is over $ 50, for you to receive a package, you will have to pay additional import tax of 19% which will be $ 9.50 to the courier service.
  • Whereas if you live in Turkey, and the declared value of your ordered items is over € 22, for you to receive a package, you will have to pay additional import tax of 18% which will be € 3.96 to the courier service.
How can I cancel my order? Chevron down icon Chevron up icon

Cancellation Policy for Published Printed Books:

You can cancel any order within 1 hour of placing the order. Simply contact [email protected] with your order details or payment transaction id. If your order has already started the shipment process, we will do our best to stop it. However, if it is already on the way to you then when you receive it, you can contact us at [email protected] using the returns and refund process.

Please understand that Packt Publishing cannot provide refunds or cancel any order except for the cases described in our Return Policy (i.e. Packt Publishing agrees to replace your printed book because it arrives damaged or material defect in book), Packt Publishing will not accept returns.

What is your returns and refunds policy? Chevron down icon Chevron up icon

Return Policy:

We want you to be happy with your purchase from Packtpub.com. We will not hassle you with returning print books to us. If the print book you receive from us is incorrect, damaged, doesn't work or is unacceptably late, please contact Customer Relations Team on [email protected] with the order number and issue details as explained below:

  1. If you ordered (eBook, Video or Print Book) incorrectly or accidentally, please contact Customer Relations Team on [email protected] within one hour of placing the order and we will replace/refund you the item cost.
  2. Sadly, if your eBook or Video file is faulty or a fault occurs during the eBook or Video being made available to you, i.e. during download then you should contact Customer Relations Team within 14 days of purchase on [email protected] who will be able to resolve this issue for you.
  3. You will have a choice of replacement or refund of the problem items.(damaged, defective or incorrect)
  4. Once Customer Care Team confirms that you will be refunded, you should receive the refund within 10 to 12 working days.
  5. If you are only requesting a refund of one book from a multiple order, then we will refund you the appropriate single item.
  6. Where the items were shipped under a free shipping offer, there will be no shipping costs to refund.

On the off chance your printed book arrives damaged, with book material defect, contact our Customer Relation Team on [email protected] within 14 days of receipt of the book with appropriate evidence of damage and we will work with you to secure a replacement copy, if necessary. Please note that each printed book you order from us is individually made by Packt's professional book-printing partner which is on a print-on-demand basis.

What tax is charged? Chevron down icon Chevron up icon

Currently, no tax is charged on the purchase of any print book (subject to change based on the laws and regulations). A localized VAT fee is charged only to our European and UK customers on eBooks, Video and subscriptions that they buy. GST is charged to Indian customers for eBooks and video purchases.

What payment methods can I use? Chevron down icon Chevron up icon

You can pay with the following card types:

  1. Visa Debit
  2. Visa Credit
  3. MasterCard
  4. PayPal
What is the delivery time and cost of print books? Chevron down icon Chevron up icon

Shipping Details

USA:

'

Economy: Delivery to most addresses in the US within 10-15 business days

Premium: Trackable Delivery to most addresses in the US within 3-8 business days

UK:

Economy: Delivery to most addresses in the U.K. within 7-9 business days.
Shipments are not trackable

Premium: Trackable delivery to most addresses in the U.K. within 3-4 business days!
Add one extra business day for deliveries to Northern Ireland and Scottish Highlands and islands

EU:

Premium: Trackable delivery to most EU destinations within 4-9 business days.

Australia:

Economy: Can deliver to P. O. Boxes and private residences.
Trackable service with delivery to addresses in Australia only.
Delivery time ranges from 7-9 business days for VIC and 8-10 business days for Interstate metro
Delivery time is up to 15 business days for remote areas of WA, NT & QLD.

Premium: Delivery to addresses in Australia only
Trackable delivery to most P. O. Boxes and private residences in Australia within 4-5 days based on the distance to a destination following dispatch.

India:

Premium: Delivery to most Indian addresses within 5-6 business days

Rest of the World:

Premium: Countries in the American continent: Trackable delivery to most countries within 4-7 business days

Asia:

Premium: Delivery to most Asian addresses within 5-9 business days

Disclaimer:
All orders received before 5 PM U.K time would start printing from the next business day. So the estimated delivery times start from the next day as well. Orders received after 5 PM U.K time (in our internal systems) on a business day or anytime on the weekend will begin printing the second to next business day. For example, an order placed at 11 AM today will begin printing tomorrow, whereas an order placed at 9 PM tonight will begin printing the day after tomorrow.


Unfortunately, due to several restrictions, we are unable to ship to the following countries:

  1. Afghanistan
  2. American Samoa
  3. Belarus
  4. Brunei Darussalam
  5. Central African Republic
  6. The Democratic Republic of Congo
  7. Eritrea
  8. Guinea-bissau
  9. Iran
  10. Lebanon
  11. Libiya Arab Jamahriya
  12. Somalia
  13. Sudan
  14. Russian Federation
  15. Syrian Arab Republic
  16. Ukraine
  17. Venezuela