Eventtipp – WEBINAR: Troubleshooting Microsoft Hyper-V – 4 Tales from the Trenches

Hi everybody,

Altaro is again featuring a new Webcast together with my friend Didier better known as Working Hard in IT. They will show you how to troubleshoot Microsoft Hyper-V 🙂 I would highly recommend the event to you.

If you’ve been in IT for any length of time, you’ve likely gotten that phone call that you never want to get: Everything is broken! It’s the end of the world! The sky is falling! Your Hyper-V Host or Cluster is broken and you are the person to fix it!

Where do you start?

What are the most common things to look for?

These are exactly some of the questions we’ll be covering in our next webinar, on February 25th, 2016 at 4pm CET / 10am EST!

Microsoft Cloud and Datacenter Management MVPs Didier Van Hoye and Andy Syrewicze will be answering these questions, and will also be sharing some tales from the trenches.

In this webinar you’ll learn Hyper-V troubleshooting basics and solutions to common problems. You’ll also see some Hyper-V oddities that were encountered by Didier and Andy and how these issues were ultimately resolved and with what tools.

It’s one thing to setup and run a virtualization solution. It’s another thing to fix it when it’s broken.

Sign up now to join us on February 25th, 2016 at 4pm CET / 10am EST (30-45mins + live Q&A!) for some tales from the trenches!

If you are interested to watch the cast, you only need to register on the Altaro website. <click here>

 

Virtual Switches in Windows Server 2016 Hyper-V

With coming nearer to the release of Windows Server 2016, more and more details about he final server are revealed.

Today I want you give a short list about the switches which will be part of Hyper-V in Windows Server 2016.

“Classical” Switches

Switchtype Discription Source
Private Switch The private switch allows communications among the virtual machines on the host and nothing else. Even the management operating system is not allowed to participate. This switch is purely logical and does not use any physical adapter in any way. “Private” in this sense is not related to private IP addressing. You can mentally think of this as a switch that has no ability to uplink to other switches. http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
Internal Switch The internal switch is similar to the private switch with one exception: the management operating system can have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also cannot uplink to another switch. http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/
External This switch type must be connected to a physical adapter. It allows communications between the physical network and the management operating system and virtual machines. Do not confuse this switch type with public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing connection. You can use the same private IP address range for the adapters on an external virtual switch that you’re using on the physical network it’s attached to. http://www.altaro.com/hyper-v/the-hyper-v-virtual-switch-explained-part-1/

New Switches available in Windows Server 2016

Switchtype Discription Source
Externals Switch with SET SET (Switch embedded Teaming) is an alternative NIC Teaming solution that you can use in environments that include Hyper-V and the Software Defined Networking (SDN) stack in Windows Server 2016 Technical Preview. SET integrates some NIC Teaming functionality into the Hyper-V Virtual Switch.SET allows you to group between one and eight physical Ethernet network adapters into one or more software-based virtual network adapters. These virtual network adapters provide fast performance and fault tolerance in the event of a network adapter failure. SET member network adapters must all be installed in the same physical Hyper-V host to be placed in a team. https://technet.microsoft.com/en-US/library/mt403349.aspx#bkmk_sswitchembedded
NAT Mode Switch With the latest releases of the Windows 10 and Windows Server 2016 Technical Preview 4, Microsoft included a new VM Switch Type called NAT, which allows Virtual Machines to have a Internal Network and connect to the external world and internet using NAT. http://www.thomasmaurer.ch/2015/11/hyper-v-virtual-switch-using-nat-configuration/

Virtual Switches in System Center Virtual Machine Manager

Switchtype Discription
Standard Switch A Standard Switch is basicly a Hyper-V Switch shown in virtual machine manager. From the management and feature perspective there are no differences.
Logical Switch A Logical Switch includes Virtual Switch Extensions, Uplink Port Profiles which define the physical network adapters used by the Hyper-V Virtual Switch for example for teaming and the Virtual Adapter Port Profiles mapped to Port Classifications which are the settings for the Virtual Network Adapters of the virtual machines.

Not really a switch but part of the Hyper-V networking stack and currently necessary in multi tenant scenarios.

Type Discription Source
Multi Tenant Gateway In Windows Server 2012 R2, the Remote Access server role includes the Routing and Remote Access Service (RRAS) role service. RRAS is integrated with Hyper-V Network Virtualization, and is able to route network traffic effectively in circumstances where there are many different customers – or tenants – who have isolated virtual networks in the same datacenter.Multi-tenancy is the ability of a cloud infrastructure to support the virtual machine workloads of multiple tenants, but isolate them from each other, while all of the workloads run on the same infrastructure. The multiple workloads of an individual tenant can interconnect and be managed remotely, but these systems do not interconnect with the workloads of other tenants, nor can other tenants remotely manage them. https://technet.microsoft.com/en-us/library/dn641937.aspx

Hyper-V|W2k12R2|4x1GB|2xFC

Hyper-V Cluster Network configuration with following parameters:

The following configuration leverages 4x 1GB Ethernet and 2x Fibre channel connections. The storage can be connected via Fibre Channel with MPIO. The configurations uses physical configuration and software defined / converged network for Hyper-V.


 Pro’s and Con’s of that solution

 Pro Con
– High Bandwidth for VM- Good Bandwidth for Storage
– Fault redundant
– Can be used in switch independent or LACP (with stacked switches) teaming mode
– Fibrechannel ist most common SAN technology
– Limited Bandwidth for Livemigration
– a lot of technologies involved

 Switches

Switch name Bandwidth Switchtyp
1GBE SW01 1 GBit/s physical stacked or independed
1GBE SW02 1 GBit/s physical stacked or independed
FC SW01 4/8 GB FC/s physical stacked or independed
FC SW02 4/8 GB FC/s physical stacked or independed
SoftSW01 1 GBit/s Software defined / converged
SoftSW02 1 GBit/s Software defined / converged

 Neccessary Networks

Networkname VLAN IP Network (IPv4) Connected to Switch
Management 100 10.11.100.0/24 SoftSW01
Cluster 101 10.11.101.0/24  SoftSW01
Livemigration 450 10.11.45.0/24  SoftSW01
Virtual Machines 200 – x 10.11.x.x/x  SoftSW02

 Possible rearview Server

NIC17


 Schematic representation

NIC14 NIC15

Switch Port Configuration

NIC16  

Bandwidth Configuration vNICs

vNIC min. Bandwidth Weight PowerShell Command
Management 20%
Cluster 10%
Livemigration 40%

QoS Configuration Switch

Networkname Priority
Management medium
Cluster high
Livemigration medium
VMs dependig on VM Workload

 

How to fix same SMBIOS ID on different Hosts

Today one post about things I see sometimes in the field.

Today I want to show you how to fix the issue when you get servers and clients with the same SMBIOS ID. Normally that would be an issue but as soon as you try to management them with System Center Virtual Machine Manager or Configuration Manager it will become one. Both tools use the SMBIOS ID to create a primary key in their databases to identify the system.

2015-11-29_14-02-03

 

Currently I only know the following trick to fix the issue and that one would be extremly annoying on many clients or servers but it actually work.

First you need two tools.

1: Rufus – To create a bootable USB Stick

2: AMIDMI – With that tool you can overright the SMBIOS ID

Now create the Bootstick with Rufus and copy the AMIDMI file on the stick.

Reboot your from the stick.

Navigate to the folder with your AMIDMI file and run the command amidmi /u

Afterwards you can reboot the system and start Windows again.

 

When you are working with Virtual Machine Manager, you need to remove the host from your management consolte and add it again. After the host is discovered again, you can see the new SMBIOS ID.

2015-11-29_14-02-50

 

I currently saw these issues with following motherboard vendors:

  1. ASRock (Client & Rack)
  2. ASUS (Client)
  3. SuperMicro (Server & ARM)
  4. Fujisu (Server)

You install Hyper-V & VMM from the green? Please do it in the right order.

Hi everybody,

today another story I see most of the days when I do Healthcheck on customer site.

One of the first things I found was a new VMM installation on top of a new Microsoft Hyper-V Cluster. The issue was, that the cluster was installed first and every thing was running on Hyper-V converged network and standard Hyper-V Switches. There was no VMM network configured or the host made compliant within VMM.

Why is that so bad? It’s bad because VMM uses it’s own kind of switches (logical switches) and needs some additional configurations to manage the hosts in the best possible way.

When I ask guy’s why they do it in that way, I normally get the answer “how should I configure the host when no VMM is in place before he install the cluster?”.

So now my answer and how you can do it in the right way.

  1. Install a Hyper-V Host as Standalone host
  2. Configure and install the VMs for VMM and SQL Server (if needed) on the standalone host
  3. Performe the ful VMM configuration
  4. Install the other Hyper-V Hosts and roll out the VMM configuration to that hosts
  5. Cluster the Hyper-V Hosts
  6. Migrate your SQL DB and VMM with shared nothing livemigration to the new Hyper-V Cluster
  7. Reconfigure the standalone Hyper-V Host with VMM and add it to the cluster
  8. Run the cluster validation again

That’s all and it will cost you the same amount of time.