SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Principles of Virtualization
Introduction to Virtualization Software
Date:
Department of Computer Engineering
Jain Group of Institution, Bangalore
Presented By:
Rubal Sagwal
Assistant Professor
Department of Computer Engineering
1ADAD
Contents
• Introduction to virtualization Software
• Introduction to Vsphere
• ESXi
• VCenter Server
• Vsphere client
• Introduction to HYPER-V.
ADAD 2
Virtualization
Software
Vmware – introduction
ADAD 3
Introduction - VMware
• VMware is a company that develops virtualization
software.
• It is the number one virtualization solution provider
in the industry.
• They are providing products for various
virtualization solutions.
• For example, Desktop virtualization, Network
virtualization, Datacenter virtualization etc.
ADAD 4
Contd…
Vmware – Introduction to vSphere
• vSphere – one of the product suites from VMware.
• It is used for Datacenter virtualization.
• vSphere is not a single product. It is a package like
Microsoft Office. Microsoft Office has many
components like MS word, MS power point, MS
Excel and so on. Similarly vSphere is also a product
suite which has many products and features like
ESXi, vCenter, vSphere Client.
• All these products and features together provide
Datacenter virtualization functionality.
ADAD 5
Contd…
Vmware – Components vSphere
• Three major components make up the vSphere.
They are:
1. ESXi
2. vSphere Client
3. vCenter Server
ADAD 6
Contd…
Vmware – Components vSphere
• ESXi server – Most important component of
VMware vSphere.
• It is the hypervisor – The hypervisor is the
component that allows multiple virtual machines
to run on the top of the single physical machine.
• Every operating system needs a processor, memory
and other hardware resources for its operations.
When multiple virtual machines are running on the
single physical machine (Single hardware resource)
the hypervisor will allocate those resources to the
virtual machine.
ADAD 7
Contd…
Vmware – Components vSphere
• Each virtual machine will interpret that it has the
physical machine’s processor, memory and other
hardware resources all to itself.
• However, the hypervisor controls – the physical
hardware resources and allocates what is needed
for each virtual machine.
• In short, hypervisor manages multiple operating
systems (multiple virtual machines) on a single
computer.
ADAD 8
Contd…
Vmware – Components vSphere
• Host – A physical machine on which hypervisor is
installed.
• Guest VM – The virtual machine that is running on
the host machine.
• Hypervisors are generally grouped into two classes:
1. Type1 Hypervisors and
2. Type 2 Hypervisors.
ADAD 9
Contd…
Vmware – Components vSphere - Type 1 hypervisor
ADAD 10
Physical Machine
Hypervisor
VM VM VM
Contd…
Vmware – Components vSphere
• The type1 hypervisor – installed directly on the
physical machine. Means, this hypervisor will act like
an operating system.
• It doesn’t need any other host operating system for its
operation. It is also called bare metal hypervisor
because it is directly installed on the server.
• The advantage of type 1 hypervisor is that the
hypervisor directly communicates with the underlying
physical hardware and then hardware resources are
allocated to multiple running machines.
ADAD 11
Contd…
Vmware – Components vSphere
• It is faster than the type2 hypervisor because it
directly interacts with the hardware.
• This type of hypervisor is preferred mostly for the
real-time production environment.
• Example of type1 hypervisors: VMware ESXi,
Microsoft Hyper V, Citrix XenServer.
ADAD 12
Contd…
Vmware – Components vSphere - Type 2 hypervisor
ADAD 13
Physical Machine
Hypervisor
VM VM VM
Operating System
Contd…
Vmware – Components vSphere
• Type 2 hypervisor - This type is also called as
Hosted hypervisor as it requires a running
operating system.
• This hypervisor is installed on the top of an
operating system like an application. It cannot be
directly installed on the physical machine.
• For example, VMware workstation is installed on
the Windows server OS.
• Examples of this type of hypervisors are VMware
Workstation, Oracle Virtualbox.
ADAD 14
Contd…
Vmware – Components vSphere
• The type2 hypervisor is generally used in a test
environment because it has a greater probability of
failure.
• For example, if the host OS reboots then all the
VM’s will also be rebooted. Its stability depends on
the host OS.
• ESXi is the type 1 hypervisor. All the virtual
machines are installed on the ESXi server.
ADAD 15
Contd…
Vmware – Components vSphere
• vSphere client and vCenter server are used to
connect to the ESXi server and allows us to create,
configure and manage virtual machines on the
ESXi server.
• vSphere Client can be installed on a client machine
(eg: Laptop) and from the client machine one can
access the ESXi server and do the management
tasks.
• Using vSphere Client, a user can manage only one
ESXi server at a time.
ADAD 16
Contd…
Vmware – Components vSphere
• vCenter server is installed on a server. It can be
installed on Windows server or Linux appliance
whichever is available.
• Using vCenter server a user can manage multiple
ESXi servers and virtual machines from different
ESXi server in a single console.
• The datacenters are provided centralized
management by vCenter Server.
• vCenter Server components are user access control,
core services, distributed services, plug-ins and
various interfaces.
ADAD 17
vSphere – ESXi
ADAD 18
Contd…
Vmware – Components vSphere - ESXi
• ESXi is – heart of the vSphere suite – It is also known as
VMM (Virtual Machine Monitor).
• Its main function is to abstract the hardware resources
and provide it to different virtual machines.
• In the ESXi host, the applications running on the virtual
machines uses hardware resources like CPU, memory
without direct access to the underlying hardware. The
ESXi hypervisor is called the VMkernel.
• The VMkernel gets the virtual machines resource
requirement from the virtual machine monitor (VMM)
and allocates the resource from physical hardware
ADAD 19
Contd…
Vmware – Components Vsphere – ESXi Features
• ESXi is very small in size. The size of the ESXi is just
144 Mb.
• ESXi provides more security using the following
features:
• Memory hardening – The ESXi kernel, other applications
and user components are stored in a random memory
address so that no one can predict it and damage it.
• Kernel module integrity –It uses digital signing to ensure
the authenticity and integrity of modules and drivers
loaded by Vmware.
• Trusted Platform Module (TPM) – It will ensure that the
boot process and drivers which are loaded are genuine.
ADAD 20
Contd…
Vmware – Components Vsphere – ESXi Features
• Hot-Pluggable PCIe SSD Devices – This feature allows the
administrator to hot-add / hot-remove SSD devices when a
vSphere host is running. So we don’t have to shut down the
host for adding any SSD devices. If we shut down the host,
all the virtual machines running on the host will be down. So
this feature reduces the down time.
• Reliable Memory Technology – VMkernel is the most
important component of vSphere ESXi Hypervisor. vSphere
ESXi runs directly in memory. So if there is any error in the
memory the entire host will become down.
• The Reliable Memory Technology will analyze the hardware
and decide which part of the memory is more reliable and
then an important component will be placed in that
location. As a result, ESXi hypervisor will not have any
memory error problem.
ADAD 21
Contd…
Vmware – Components Vsphere – ESXi Features
• CPU C-state – CPU C-state feature is used for power
saving. This feature minimizes the host CPU power
consumption during the idle state.
ADAD 22
Contd…
Vmware – Components Vsphere – Installing ESXi
• Before proceeding with the installation we will first
understand the system requirements for ESXi. System
Requirements for ESXi:
• Processor – 64bit Intel or AMD CPU
• Memory – 4GB (provide at least 8GB for better performance)
• Network – Minimum 1GB NIC (10GB is recommended)
• ESXi can be installed on a hard disk, USB device, or SD
card. It can also be installed on diskless hosts (directly
into memory) with a feature called Auto Deploy.
Following are the steps to install ESXi on USB.
• Download ESXi Installer and create a bootable USB.
• Insert the USB in your server and make USB as your first
boot device.
ADAD 23
Contd…
Vmware – Components Vsphere – Installing ESXi
• Step 1: Press Enter to continue to boot from the USB.
• Next, the ESXi installer is loaded.
• Step 2: Press Enter to start the installation
• Step 3: Press F11 to accept the EULA
• Step 4: Select the Drive, where you want to install ESXi and press Enter to continue. (Select your
local hard disk.)
• Step 5: Select the Keyboard Layout and press Enter to continue.
• Step 6: Next, you need to set the root (administrator) password.
• Step 7: Press F11 to start the installation.
• Now the VMware ESXi installation is started
• Step 8: Press Enter to reboot, once the installation is over.
• ESXi has been installed successfully.
• After installation, it can be accessed from DCUI, vSphere Client, SSH , ESXi Shell, vCLI.
• We will use DCUI to configure primary settings such as Management IP address. Most of the
time vSphere client is used to manage the ESXi host.
ADAD 24
Contd…
Vmware – Components Vsphere – Configuring ESXi
Using DCUI
• The Direct Console User Interface (DCUI) allows you to
interact with the host locally using text-based menus.
You can use the DCUI to enable local and remote access
to the ESXi Shell.
• The server screen after you installed ESXi is called
Direct Console User Interface (DCUI). It is the interface
to access the ESXi and configure basic settings such as
configuring IP address of ESXi.
• Using this DCUI interface, we can configure only limited
options. You can see the options configured using ESXi
in the above diagram 5.1.14. We can configure the
actions using the arrow keys. DCUI will not support
mouse operations.
ADAD 25
Contd…
Vmware – Components Vsphere – Configuring ESXi
Using DCUI
• Configure Lockdown mode – It is a security option.
When it is enabled in lockdown mode, it will not grant
access to the ESXi directly using vSphere client or SSH
or ESxi Shell. If you want to make any changes to the
host, it can be accessed only through vCenter.
• Configuring Management Network – The host should
provide the IP address so that it can be accessed
through the vSphere client, SSH etc. If you have DHCP
server in your environment, it will automatically
allocate the IP address. If there is no DHCP then we
must manually configure the IP address using DCUI.
• Using DCUI we can configure basic network settings like
IP address Subnet mask, default route and DNS.
ADAD 26
vSphere – vSphere
Client
ADAD 27
Introduction
• The vSphere Client – provides all the tools needed to
effectively configure and manage the ESXi.
• The vsphere client allows – direct access to an ESX/ESXi
host.
• It is the primary interface for managing the entire
vSphere environment.
• Using vSphere client, we can also view the console of
the virtual machine.
• The vSphere Client runs on Windows operating
systems. We can install the vSphere client using
vSphere vCenter server installer. (
ADAD 28
Contd…
vSphere Client – Installing vSphere Client
i. Download the vSphere vCenter installer in the client machine
and execute the file.
ii. In the VMware vCenter Installer window, click vSphere Client.
iii. Click Install to start the installation wizard. If Security Warning
dialog boxes appear, click Run to continue.
iv. Choose Setup Language. Leave the default value English
(United States) and Click OK
You can see Welcome to the Installation Wizard for the
vSphere Client 5.0.
By clicking Next option you are setting the default value for
End User Patents. Accept the terms of the License
Agreement, and click Next for Customer Information.
Provide the user name and organization name.
ADAD 29
Contd…
vSphere Client – Installing vSphere Client
v. Click Next option in Destination Folder and Install
option in Ready to install the program so that the
installation is done.
vi. When the installation is complete, click Finish.
vii. Click Exit and close the wizard.
viii. Once it is installed, the vSphere Client icon will
be created on the client machine desktop.
ADAD 30
Contd…
vSphere Client – Managing ESXi using vSphere
Client
i. Double-click the vSphere Client icon on the desktop system.
ii. Enter the IP address of your ESXi host in the IP Address/Name field.
Provide username and password of the ESXi host and log in.
After you login, you can view the Host in the left pane.
The Configuration tab will show the software and hardware
configuration of the host. Using that you can view the host’s
configuration such as memory size. Using this we can also configure
the host’s license, enable NTP service in the host so that it will act
as an NTP server and provide time to all the VMs running on the
host, t configure DNS server.
In the configuration tab under the hardware configuration, you can
see the Processor information like CPU manufacturer, number CPU
cores etc. Similarly, we can view memory information also.
ADAD 31
vSphere – vCenter
ADAD 32
Introduction
• vCenter – is the management tool used to manage
the entire vSphere virtualization environment.
• Using vCenter we can manage multiple ESXi hosts,
virtual machines running on the hosts, datastores
that stores the virtual machine files and so on.
• vCenter Server can be installed in two methods:
1. Windows based vCenter server
2. vCenter Appliance
ADAD 33
Contd…
vCenter
1. Windows based vCenter server
• vCenter is installed as a service on the windows server.
This service manages the virtual machines and the ESXi
hosts.
• A single vCenter server can manage up to 1000 ESXi
hosts and 10000 powered on virtual machines.
• vCenter server can run on physical windows server
machine or virtual windows server machine.
ADAD 34
Contd…
vCenter
2. vCenter Server Appliance
• The vCenter Server Linux Virtual Appliance (vCSA) is
available as an ovf template.
• It is a Linux based machine with vcenter service already
enabled.
• In other words, it is a virtual machine with SUSE Linux
OS installed and all the service and features of vCenter
are installed in the machine.
• If we want to use this appliance, we can just download it
and run as a virtual machine on any ESXi host. It will act
as a vCenter server.
ADAD 35
Contd…
vCenter
vCenter Server Virtual Appliance features
• Installed on SUSE Linux Enterprise Server 11 x64.
• It has an embedded DB2 database that can be used in
environments with less than 100 ESXi hosts and 3000 virtual
machines. The administrator need not configure separate
database server.
• If the environment has more than 100 ESXi hosts, then the
administrator can configure external Oracle database.
Resources required on Host for Appliance
• Disk Space 7 – 82 GB
• Memory 4 - 24 GB
• CPU – 2 virtual CPUs
ADAD 36
Contd…
vCenter
vCenter Server Virtual Appliance benefits
1. It is very easy to install. We can quickly create the
vCenter server because if we are installing in Windows
based vCenter then Windows server OS, vCenter service,
and SQL Express database have to be installed. All the
vCenter server information will be stored in the database
and appliance is run as a virtual machine
2. It has an inbuilt DB2 database, so administrator need
not configure separate database.
3. We don’t need a Windows server, so windows server
license is not required.
ADAD 37
Contd…
vCenter - Components of vCenter server
ADAD 38
Contd…
vCenter - Components of vCenter server
• vCenter Single Sign-On
VMware vCenter Single Sign-On is a major component of
the vCenter Server environment because it provides the
authentication services to the vSphere components.
vCenter single sign-on authenticates the users logging to
the vSphere components such as a vSphere client.
• vSphere Web Client
The vSphere Web Client is an interface to the vCenter like
a vSphere client. It connects directly to vCenter from the
browser. So dependency on the vSphere client is
eliminated.
ADAD 39
Contd…
vCenter - Components of vCenter server
• vCenter Inventory Service
When we do any operation in the vCenter, the server will
refer the database. But most of the vCenter operations
are read-only operation, write operations are very
limited. So instead of accessing the database server every
time, we can use the inventory service. Inventory service
is like a cache. It stores the frequently used information
so the vCenter will refer this cache. It improves the
performance of the vCenter.
• vCenter Server database
It is the most critical component. The database stores all
the information required for the vCenter, for example,
the hosts managed by vCenter.
ADAD 40
Contd…
vCenter - vCenter Deployment Processes
ADAD 41
• When we are deploying vCenter, we have to install the
components of vCenter.
• We can install the vCenter using the vSphere vCenter
deployment wizard. There are two options available for
this installation.
1. Simple Install
2. Custom Install
1. Simple Install – The simple install option installs the
four components of vCenter in a single machine. It
installs all the four components in a single process. It
installs these components with default options such
as the location of the folder.
Contd…
vCenter - vCenter Deployment Processes
ADAD 42
2. Custom Install – In this method, we have to install
each component separately. We can also install each
component on a different machine, but we have to install
the component in the following order.
1. vCenter Single Sign-On
2. vSphere Web Client
3. vCenter Inventory Service
4. vCenter Server
In the following situations, custom install methods are
used:
1. To install each vCenter component in the different
machine.
2. To change the storage location of a component.
3. To install multiple vCenter servers.z
Hyper V
ADAD 43
Introduction
• Hyper-V is – just a product from Microsoft that is
based upon the generic term "HyperVisor“ (Microsoft's
hardware virtualization product).
• It lets you create and run a software version of a
computer, called a virtual machine.
• Each virtual machine acts like a complete computer,
running an operating system and programs. When you
need computing resources, virtual machines give you
more flexibility, help save time and money, and are a
more efficient way to use hardware than just running
one operating system on physical hardware.
ADAD 44
Contd…
Hyper – v
• Hyper-V runs each virtual machine in its own
isolated space, which means you can run more
than one virtual machine on the same hardware
at the same time.
• It avoids problems such as a crash affecting the
other workloads, or to give different people, groups
or services access to different systems.
ADAD 45
Contd…
Hyper-v Role
• The Hyper-V role in Windows Server lets you create
a virtualized computing environment where you
can create and manage virtual machines.
• You can run multiple operating systems on one
physical computer and isolate the operating
systems from each other.
• With this technology, you can improve the
efficiency of your computing resources and free up
your hardware resources.
ADAD 46
Contd…
Hyper-V – Helps us in following ways
• Establish or expand a private cloud environment –
Provide more flexible, on-demand IT services by
moving to or expanding your use of shared resources
and adjust utilization as demand changes.
• Use your hardware more effectively – Consolidate
servers and workloads onto fewer, more powerful
physical computers to use less power and physical
space.
• Improve business continuity – Minimize the impact of
both scheduled and unscheduled downtime of your
workloads.
ADAD 47
Contd…
Hyper-V – Helps us in following ways
• Establish or expand a virtual desktop infrastructure
(VDI) – Use a centralized desktop strategy with VDI can
help you increase business agility and data security, as
well as simplify regulatory compliance and manage
desktop operating systems and applications. Deploy
Hyper-V and Remote Desktop Virtualization Host (RD
Virtualization Host) on the same server to make
personal virtual desktops or virtual desktop pools
available to your users.
• Make development and test more efficient –
Reproduce different computing environments without
having to buy or maintain all the hardware you'd need
if you only used physical systems.
ADAD 48
Contd…
Hyper-V – Features
• Computing environment – A Hyper-V virtual machine
includes the same basic parts as a physical computer, such
as memory, processor, storage, and networking. All these
parts have features and options that you can configure
different ways to meet different needs. Storage and
networking can each be considered categories of their own,
because of the many ways you can configure them.
• Disaster recovery and backup – For disaster recovery,
Hyper-V Replica creates copies of virtual machines,
intended to be stored in another physical location, so you
can restore the virtual machine from the copy. For backup,
Hyper-V offers two types. One uses saved states and the
other uses Volume Shadow Copy Service (VSS) so you can
make application-consistent backups for programs that
support VSS.
ADAD 49
Contd…
Hyper-V – Features
• Optimization – Each supported guest operating system has
a customized set of services and drivers, called integration
services, that make it easier to use the operating system in a
Hyper-V virtual machine.
• Portability – Features such as live migration, storage
migration, and import/export make it easier to move or
distribute a virtual machine.
• Remote connectivity – Hyper-V includes Virtual Machine
Connection, a remote connection tool for use with both
Windows and Linux. Unlike Remote Desktop, this tool gives
you console access, so you can see what's happening in the
guest even when the operating system isn't booted yet.
• Security – Secure boot and shielded virtual machines help
protect against malware and other unauthorized access to a
virtual machine and its data.
ADAD 50
Thank You!
ADAD 51

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

OpenStack Ironic - Bare Metal-as-a-Service
OpenStack Ironic - Bare Metal-as-a-ServiceOpenStack Ironic - Bare Metal-as-a-Service
OpenStack Ironic - Bare Metal-as-a-Service
 
how to install VMware
how to install VMwarehow to install VMware
how to install VMware
 
Linux LVM Logical Volume Management
Linux LVM Logical Volume ManagementLinux LVM Logical Volume Management
Linux LVM Logical Volume Management
 
Virtual Machine
Virtual MachineVirtual Machine
Virtual Machine
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Ibm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshopIbm power ha v7 technical deep dive workshop
Ibm power ha v7 technical deep dive workshop
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014VMware VSAN Technical Deep Dive - March 2014
VMware VSAN Technical Deep Dive - March 2014
 
20150511 jun lee_openstack neutron 분석 (최종)
20150511 jun lee_openstack neutron 분석 (최종)20150511 jun lee_openstack neutron 분석 (최종)
20150511 jun lee_openstack neutron 분석 (최종)
 
Window server editions
Window server editionsWindow server editions
Window server editions
 
VMware Interview questions and answers
VMware Interview questions and answersVMware Interview questions and answers
VMware Interview questions and answers
 
What is a Server
What is a ServerWhat is a Server
What is a Server
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5
 
Virtualization Vs. Containers
Virtualization Vs. ContainersVirtualization Vs. Containers
Virtualization Vs. Containers
 
Hyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: ConceptsHyper-Converged Infrastructure: Concepts
Hyper-Converged Infrastructure: Concepts
 
iSCSI Protocol and Functionality
iSCSI Protocol and FunctionalityiSCSI Protocol and Functionality
iSCSI Protocol and Functionality
 
History of Windows Server
History of Windows ServerHistory of Windows Server
History of Windows Server
 
Dave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMUDave Gilbert - KVM and QEMU
Dave Gilbert - KVM and QEMU
 
File Sever
File SeverFile Sever
File Sever
 
VMware vSphere Networking deep dive
VMware vSphere Networking deep diveVMware vSphere Networking deep dive
VMware vSphere Networking deep dive
 

Ähnlich wie Principles of Virtualization - Introduction to Virtualization Software

V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
karanamsaibabu
 

Ähnlich wie Principles of Virtualization - Introduction to Virtualization Software (20)

Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
Practical Implementation of Virtual Machine
Practical Implementation of Virtual MachinePractical Implementation of Virtual Machine
Practical Implementation of Virtual Machine
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
VMware Virtualization Basics - Part-1.pptx
VMware Virtualization Basics - Part-1.pptxVMware Virtualization Basics - Part-1.pptx
VMware Virtualization Basics - Part-1.pptx
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
Vmwareinterviewqa 100927111554-phpapp01
Vmwareinterviewqa 100927111554-phpapp01Vmwareinterviewqa 100927111554-phpapp01
Vmwareinterviewqa 100927111554-phpapp01
 
01 v mware overview
01  v mware overview01  v mware overview
01 v mware overview
 
Virtualization concepts in cloud computing
Virtualization concepts in cloud computingVirtualization concepts in cloud computing
Virtualization concepts in cloud computing
 
Lecture5 virtualization
Lecture5 virtualizationLecture5 virtualization
Lecture5 virtualization
 
Virtualization and how it leads to cloud
Virtualization and how it leads to cloudVirtualization and how it leads to cloud
Virtualization and how it leads to cloud
 
Virtualization basics
Virtualization basics Virtualization basics
Virtualization basics
 
Virtualization in Cloud Computing
Virtualization in Cloud ComputingVirtualization in Cloud Computing
Virtualization in Cloud Computing
 
vmware interview Q and a
vmware interview Q and avmware interview Q and a
vmware interview Q and a
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Virtualization & tipping point
Virtualization & tipping pointVirtualization & tipping point
Virtualization & tipping point
 
Cloud Computing Virtualization and containers
Cloud Computing Virtualization and containersCloud Computing Virtualization and containers
Cloud Computing Virtualization and containers
 
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS InstallVMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
VMware DCV_ICM_Architectural Differences, Virtual Machines, Guest OS Install
 
Virtual machine
Virtual machineVirtual machine
Virtual machine
 
Virtualization using VMWare Workstation
Virtualization using VMWare WorkstationVirtualization using VMWare Workstation
Virtualization using VMWare Workstation
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 

Mehr von Rubal Sagwal

Mehr von Rubal Sagwal (20)

Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Cloud and Virtualization Security
Cloud and Virtualization SecurityCloud and Virtualization Security
Cloud and Virtualization Security
 
Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)Cloud and Virtualization (Using Virtualization to form Clouds)
Cloud and Virtualization (Using Virtualization to form Clouds)
 
ER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMSER Modeling and Introduction to RDBMS
ER Modeling and Introduction to RDBMS
 
Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...Database Models, Client-Server Architecture, Distributed Database and Classif...
Database Models, Client-Server Architecture, Distributed Database and Classif...
 
Overview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and ArchitectureOverview of Data Base Systems Concepts and Architecture
Overview of Data Base Systems Concepts and Architecture
 
Accessing virtualized published applications
Accessing virtualized published applicationsAccessing virtualized published applications
Accessing virtualized published applications
 
Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization      Prepare and Manage Remote Applications through Virtualization
Prepare and Manage Remote Applications through Virtualization
 
Managing Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine ResourcesManaging Virtual Hard Disk and Virtual Machine Resources
Managing Virtual Hard Disk and Virtual Machine Resources
 
Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms Configure and Manage Virtualization on different Platforms
Configure and Manage Virtualization on different Platforms
 
Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation Virtualization Uses - Server Consolidation
Virtualization Uses - Server Consolidation
 
Principles of virtualization
Principles of virtualizationPrinciples of virtualization
Principles of virtualization
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
Application Layer and Protocols
Application Layer and ProtocolsApplication Layer and Protocols
Application Layer and Protocols
 
Basics of Network Layer and Transport Layer
Basics of Network Layer and Transport LayerBasics of Network Layer and Transport Layer
Basics of Network Layer and Transport Layer
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP Ethernet, Point-to-Point Protocol, ARP
Ethernet, Point-to-Point Protocol, ARP
 
Basics of Computer Network Device
Basics of Computer Network DeviceBasics of Computer Network Device
Basics of Computer Network Device
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Network Topology and Transmission Media
Network Topology and Transmission MediaNetwork Topology and Transmission Media
Network Topology and Transmission Media
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Principles of Virtualization - Introduction to Virtualization Software

  • 1. Principles of Virtualization Introduction to Virtualization Software Date: Department of Computer Engineering Jain Group of Institution, Bangalore Presented By: Rubal Sagwal Assistant Professor Department of Computer Engineering 1ADAD
  • 2. Contents • Introduction to virtualization Software • Introduction to Vsphere • ESXi • VCenter Server • Vsphere client • Introduction to HYPER-V. ADAD 2
  • 4. Introduction - VMware • VMware is a company that develops virtualization software. • It is the number one virtualization solution provider in the industry. • They are providing products for various virtualization solutions. • For example, Desktop virtualization, Network virtualization, Datacenter virtualization etc. ADAD 4
  • 5. Contd… Vmware – Introduction to vSphere • vSphere – one of the product suites from VMware. • It is used for Datacenter virtualization. • vSphere is not a single product. It is a package like Microsoft Office. Microsoft Office has many components like MS word, MS power point, MS Excel and so on. Similarly vSphere is also a product suite which has many products and features like ESXi, vCenter, vSphere Client. • All these products and features together provide Datacenter virtualization functionality. ADAD 5
  • 6. Contd… Vmware – Components vSphere • Three major components make up the vSphere. They are: 1. ESXi 2. vSphere Client 3. vCenter Server ADAD 6
  • 7. Contd… Vmware – Components vSphere • ESXi server – Most important component of VMware vSphere. • It is the hypervisor – The hypervisor is the component that allows multiple virtual machines to run on the top of the single physical machine. • Every operating system needs a processor, memory and other hardware resources for its operations. When multiple virtual machines are running on the single physical machine (Single hardware resource) the hypervisor will allocate those resources to the virtual machine. ADAD 7
  • 8. Contd… Vmware – Components vSphere • Each virtual machine will interpret that it has the physical machine’s processor, memory and other hardware resources all to itself. • However, the hypervisor controls – the physical hardware resources and allocates what is needed for each virtual machine. • In short, hypervisor manages multiple operating systems (multiple virtual machines) on a single computer. ADAD 8
  • 9. Contd… Vmware – Components vSphere • Host – A physical machine on which hypervisor is installed. • Guest VM – The virtual machine that is running on the host machine. • Hypervisors are generally grouped into two classes: 1. Type1 Hypervisors and 2. Type 2 Hypervisors. ADAD 9
  • 10. Contd… Vmware – Components vSphere - Type 1 hypervisor ADAD 10 Physical Machine Hypervisor VM VM VM
  • 11. Contd… Vmware – Components vSphere • The type1 hypervisor – installed directly on the physical machine. Means, this hypervisor will act like an operating system. • It doesn’t need any other host operating system for its operation. It is also called bare metal hypervisor because it is directly installed on the server. • The advantage of type 1 hypervisor is that the hypervisor directly communicates with the underlying physical hardware and then hardware resources are allocated to multiple running machines. ADAD 11
  • 12. Contd… Vmware – Components vSphere • It is faster than the type2 hypervisor because it directly interacts with the hardware. • This type of hypervisor is preferred mostly for the real-time production environment. • Example of type1 hypervisors: VMware ESXi, Microsoft Hyper V, Citrix XenServer. ADAD 12
  • 13. Contd… Vmware – Components vSphere - Type 2 hypervisor ADAD 13 Physical Machine Hypervisor VM VM VM Operating System
  • 14. Contd… Vmware – Components vSphere • Type 2 hypervisor - This type is also called as Hosted hypervisor as it requires a running operating system. • This hypervisor is installed on the top of an operating system like an application. It cannot be directly installed on the physical machine. • For example, VMware workstation is installed on the Windows server OS. • Examples of this type of hypervisors are VMware Workstation, Oracle Virtualbox. ADAD 14
  • 15. Contd… Vmware – Components vSphere • The type2 hypervisor is generally used in a test environment because it has a greater probability of failure. • For example, if the host OS reboots then all the VM’s will also be rebooted. Its stability depends on the host OS. • ESXi is the type 1 hypervisor. All the virtual machines are installed on the ESXi server. ADAD 15
  • 16. Contd… Vmware – Components vSphere • vSphere client and vCenter server are used to connect to the ESXi server and allows us to create, configure and manage virtual machines on the ESXi server. • vSphere Client can be installed on a client machine (eg: Laptop) and from the client machine one can access the ESXi server and do the management tasks. • Using vSphere Client, a user can manage only one ESXi server at a time. ADAD 16
  • 17. Contd… Vmware – Components vSphere • vCenter server is installed on a server. It can be installed on Windows server or Linux appliance whichever is available. • Using vCenter server a user can manage multiple ESXi servers and virtual machines from different ESXi server in a single console. • The datacenters are provided centralized management by vCenter Server. • vCenter Server components are user access control, core services, distributed services, plug-ins and various interfaces. ADAD 17
  • 19. Contd… Vmware – Components vSphere - ESXi • ESXi is – heart of the vSphere suite – It is also known as VMM (Virtual Machine Monitor). • Its main function is to abstract the hardware resources and provide it to different virtual machines. • In the ESXi host, the applications running on the virtual machines uses hardware resources like CPU, memory without direct access to the underlying hardware. The ESXi hypervisor is called the VMkernel. • The VMkernel gets the virtual machines resource requirement from the virtual machine monitor (VMM) and allocates the resource from physical hardware ADAD 19
  • 20. Contd… Vmware – Components Vsphere – ESXi Features • ESXi is very small in size. The size of the ESXi is just 144 Mb. • ESXi provides more security using the following features: • Memory hardening – The ESXi kernel, other applications and user components are stored in a random memory address so that no one can predict it and damage it. • Kernel module integrity –It uses digital signing to ensure the authenticity and integrity of modules and drivers loaded by Vmware. • Trusted Platform Module (TPM) – It will ensure that the boot process and drivers which are loaded are genuine. ADAD 20
  • 21. Contd… Vmware – Components Vsphere – ESXi Features • Hot-Pluggable PCIe SSD Devices – This feature allows the administrator to hot-add / hot-remove SSD devices when a vSphere host is running. So we don’t have to shut down the host for adding any SSD devices. If we shut down the host, all the virtual machines running on the host will be down. So this feature reduces the down time. • Reliable Memory Technology – VMkernel is the most important component of vSphere ESXi Hypervisor. vSphere ESXi runs directly in memory. So if there is any error in the memory the entire host will become down. • The Reliable Memory Technology will analyze the hardware and decide which part of the memory is more reliable and then an important component will be placed in that location. As a result, ESXi hypervisor will not have any memory error problem. ADAD 21
  • 22. Contd… Vmware – Components Vsphere – ESXi Features • CPU C-state – CPU C-state feature is used for power saving. This feature minimizes the host CPU power consumption during the idle state. ADAD 22
  • 23. Contd… Vmware – Components Vsphere – Installing ESXi • Before proceeding with the installation we will first understand the system requirements for ESXi. System Requirements for ESXi: • Processor – 64bit Intel or AMD CPU • Memory – 4GB (provide at least 8GB for better performance) • Network – Minimum 1GB NIC (10GB is recommended) • ESXi can be installed on a hard disk, USB device, or SD card. It can also be installed on diskless hosts (directly into memory) with a feature called Auto Deploy. Following are the steps to install ESXi on USB. • Download ESXi Installer and create a bootable USB. • Insert the USB in your server and make USB as your first boot device. ADAD 23
  • 24. Contd… Vmware – Components Vsphere – Installing ESXi • Step 1: Press Enter to continue to boot from the USB. • Next, the ESXi installer is loaded. • Step 2: Press Enter to start the installation • Step 3: Press F11 to accept the EULA • Step 4: Select the Drive, where you want to install ESXi and press Enter to continue. (Select your local hard disk.) • Step 5: Select the Keyboard Layout and press Enter to continue. • Step 6: Next, you need to set the root (administrator) password. • Step 7: Press F11 to start the installation. • Now the VMware ESXi installation is started • Step 8: Press Enter to reboot, once the installation is over. • ESXi has been installed successfully. • After installation, it can be accessed from DCUI, vSphere Client, SSH , ESXi Shell, vCLI. • We will use DCUI to configure primary settings such as Management IP address. Most of the time vSphere client is used to manage the ESXi host. ADAD 24
  • 25. Contd… Vmware – Components Vsphere – Configuring ESXi Using DCUI • The Direct Console User Interface (DCUI) allows you to interact with the host locally using text-based menus. You can use the DCUI to enable local and remote access to the ESXi Shell. • The server screen after you installed ESXi is called Direct Console User Interface (DCUI). It is the interface to access the ESXi and configure basic settings such as configuring IP address of ESXi. • Using this DCUI interface, we can configure only limited options. You can see the options configured using ESXi in the above diagram 5.1.14. We can configure the actions using the arrow keys. DCUI will not support mouse operations. ADAD 25
  • 26. Contd… Vmware – Components Vsphere – Configuring ESXi Using DCUI • Configure Lockdown mode – It is a security option. When it is enabled in lockdown mode, it will not grant access to the ESXi directly using vSphere client or SSH or ESxi Shell. If you want to make any changes to the host, it can be accessed only through vCenter. • Configuring Management Network – The host should provide the IP address so that it can be accessed through the vSphere client, SSH etc. If you have DHCP server in your environment, it will automatically allocate the IP address. If there is no DHCP then we must manually configure the IP address using DCUI. • Using DCUI we can configure basic network settings like IP address Subnet mask, default route and DNS. ADAD 26
  • 28. Introduction • The vSphere Client – provides all the tools needed to effectively configure and manage the ESXi. • The vsphere client allows – direct access to an ESX/ESXi host. • It is the primary interface for managing the entire vSphere environment. • Using vSphere client, we can also view the console of the virtual machine. • The vSphere Client runs on Windows operating systems. We can install the vSphere client using vSphere vCenter server installer. ( ADAD 28
  • 29. Contd… vSphere Client – Installing vSphere Client i. Download the vSphere vCenter installer in the client machine and execute the file. ii. In the VMware vCenter Installer window, click vSphere Client. iii. Click Install to start the installation wizard. If Security Warning dialog boxes appear, click Run to continue. iv. Choose Setup Language. Leave the default value English (United States) and Click OK You can see Welcome to the Installation Wizard for the vSphere Client 5.0. By clicking Next option you are setting the default value for End User Patents. Accept the terms of the License Agreement, and click Next for Customer Information. Provide the user name and organization name. ADAD 29
  • 30. Contd… vSphere Client – Installing vSphere Client v. Click Next option in Destination Folder and Install option in Ready to install the program so that the installation is done. vi. When the installation is complete, click Finish. vii. Click Exit and close the wizard. viii. Once it is installed, the vSphere Client icon will be created on the client machine desktop. ADAD 30
  • 31. Contd… vSphere Client – Managing ESXi using vSphere Client i. Double-click the vSphere Client icon on the desktop system. ii. Enter the IP address of your ESXi host in the IP Address/Name field. Provide username and password of the ESXi host and log in. After you login, you can view the Host in the left pane. The Configuration tab will show the software and hardware configuration of the host. Using that you can view the host’s configuration such as memory size. Using this we can also configure the host’s license, enable NTP service in the host so that it will act as an NTP server and provide time to all the VMs running on the host, t configure DNS server. In the configuration tab under the hardware configuration, you can see the Processor information like CPU manufacturer, number CPU cores etc. Similarly, we can view memory information also. ADAD 31
  • 33. Introduction • vCenter – is the management tool used to manage the entire vSphere virtualization environment. • Using vCenter we can manage multiple ESXi hosts, virtual machines running on the hosts, datastores that stores the virtual machine files and so on. • vCenter Server can be installed in two methods: 1. Windows based vCenter server 2. vCenter Appliance ADAD 33
  • 34. Contd… vCenter 1. Windows based vCenter server • vCenter is installed as a service on the windows server. This service manages the virtual machines and the ESXi hosts. • A single vCenter server can manage up to 1000 ESXi hosts and 10000 powered on virtual machines. • vCenter server can run on physical windows server machine or virtual windows server machine. ADAD 34
  • 35. Contd… vCenter 2. vCenter Server Appliance • The vCenter Server Linux Virtual Appliance (vCSA) is available as an ovf template. • It is a Linux based machine with vcenter service already enabled. • In other words, it is a virtual machine with SUSE Linux OS installed and all the service and features of vCenter are installed in the machine. • If we want to use this appliance, we can just download it and run as a virtual machine on any ESXi host. It will act as a vCenter server. ADAD 35
  • 36. Contd… vCenter vCenter Server Virtual Appliance features • Installed on SUSE Linux Enterprise Server 11 x64. • It has an embedded DB2 database that can be used in environments with less than 100 ESXi hosts and 3000 virtual machines. The administrator need not configure separate database server. • If the environment has more than 100 ESXi hosts, then the administrator can configure external Oracle database. Resources required on Host for Appliance • Disk Space 7 – 82 GB • Memory 4 - 24 GB • CPU – 2 virtual CPUs ADAD 36
  • 37. Contd… vCenter vCenter Server Virtual Appliance benefits 1. It is very easy to install. We can quickly create the vCenter server because if we are installing in Windows based vCenter then Windows server OS, vCenter service, and SQL Express database have to be installed. All the vCenter server information will be stored in the database and appliance is run as a virtual machine 2. It has an inbuilt DB2 database, so administrator need not configure separate database. 3. We don’t need a Windows server, so windows server license is not required. ADAD 37
  • 38. Contd… vCenter - Components of vCenter server ADAD 38
  • 39. Contd… vCenter - Components of vCenter server • vCenter Single Sign-On VMware vCenter Single Sign-On is a major component of the vCenter Server environment because it provides the authentication services to the vSphere components. vCenter single sign-on authenticates the users logging to the vSphere components such as a vSphere client. • vSphere Web Client The vSphere Web Client is an interface to the vCenter like a vSphere client. It connects directly to vCenter from the browser. So dependency on the vSphere client is eliminated. ADAD 39
  • 40. Contd… vCenter - Components of vCenter server • vCenter Inventory Service When we do any operation in the vCenter, the server will refer the database. But most of the vCenter operations are read-only operation, write operations are very limited. So instead of accessing the database server every time, we can use the inventory service. Inventory service is like a cache. It stores the frequently used information so the vCenter will refer this cache. It improves the performance of the vCenter. • vCenter Server database It is the most critical component. The database stores all the information required for the vCenter, for example, the hosts managed by vCenter. ADAD 40
  • 41. Contd… vCenter - vCenter Deployment Processes ADAD 41 • When we are deploying vCenter, we have to install the components of vCenter. • We can install the vCenter using the vSphere vCenter deployment wizard. There are two options available for this installation. 1. Simple Install 2. Custom Install 1. Simple Install – The simple install option installs the four components of vCenter in a single machine. It installs all the four components in a single process. It installs these components with default options such as the location of the folder.
  • 42. Contd… vCenter - vCenter Deployment Processes ADAD 42 2. Custom Install – In this method, we have to install each component separately. We can also install each component on a different machine, but we have to install the component in the following order. 1. vCenter Single Sign-On 2. vSphere Web Client 3. vCenter Inventory Service 4. vCenter Server In the following situations, custom install methods are used: 1. To install each vCenter component in the different machine. 2. To change the storage location of a component. 3. To install multiple vCenter servers.z
  • 44. Introduction • Hyper-V is – just a product from Microsoft that is based upon the generic term "HyperVisor“ (Microsoft's hardware virtualization product). • It lets you create and run a software version of a computer, called a virtual machine. • Each virtual machine acts like a complete computer, running an operating system and programs. When you need computing resources, virtual machines give you more flexibility, help save time and money, and are a more efficient way to use hardware than just running one operating system on physical hardware. ADAD 44
  • 45. Contd… Hyper – v • Hyper-V runs each virtual machine in its own isolated space, which means you can run more than one virtual machine on the same hardware at the same time. • It avoids problems such as a crash affecting the other workloads, or to give different people, groups or services access to different systems. ADAD 45
  • 46. Contd… Hyper-v Role • The Hyper-V role in Windows Server lets you create a virtualized computing environment where you can create and manage virtual machines. • You can run multiple operating systems on one physical computer and isolate the operating systems from each other. • With this technology, you can improve the efficiency of your computing resources and free up your hardware resources. ADAD 46
  • 47. Contd… Hyper-V – Helps us in following ways • Establish or expand a private cloud environment – Provide more flexible, on-demand IT services by moving to or expanding your use of shared resources and adjust utilization as demand changes. • Use your hardware more effectively – Consolidate servers and workloads onto fewer, more powerful physical computers to use less power and physical space. • Improve business continuity – Minimize the impact of both scheduled and unscheduled downtime of your workloads. ADAD 47
  • 48. Contd… Hyper-V – Helps us in following ways • Establish or expand a virtual desktop infrastructure (VDI) – Use a centralized desktop strategy with VDI can help you increase business agility and data security, as well as simplify regulatory compliance and manage desktop operating systems and applications. Deploy Hyper-V and Remote Desktop Virtualization Host (RD Virtualization Host) on the same server to make personal virtual desktops or virtual desktop pools available to your users. • Make development and test more efficient – Reproduce different computing environments without having to buy or maintain all the hardware you'd need if you only used physical systems. ADAD 48
  • 49. Contd… Hyper-V – Features • Computing environment – A Hyper-V virtual machine includes the same basic parts as a physical computer, such as memory, processor, storage, and networking. All these parts have features and options that you can configure different ways to meet different needs. Storage and networking can each be considered categories of their own, because of the many ways you can configure them. • Disaster recovery and backup – For disaster recovery, Hyper-V Replica creates copies of virtual machines, intended to be stored in another physical location, so you can restore the virtual machine from the copy. For backup, Hyper-V offers two types. One uses saved states and the other uses Volume Shadow Copy Service (VSS) so you can make application-consistent backups for programs that support VSS. ADAD 49
  • 50. Contd… Hyper-V – Features • Optimization – Each supported guest operating system has a customized set of services and drivers, called integration services, that make it easier to use the operating system in a Hyper-V virtual machine. • Portability – Features such as live migration, storage migration, and import/export make it easier to move or distribute a virtual machine. • Remote connectivity – Hyper-V includes Virtual Machine Connection, a remote connection tool for use with both Windows and Linux. Unlike Remote Desktop, this tool gives you console access, so you can see what's happening in the guest even when the operating system isn't booted yet. • Security – Secure boot and shielded virtual machines help protect against malware and other unauthorized access to a virtual machine and its data. ADAD 50