VMM Integration Setup with OpsMgr Fails

This deals with a scenario where you run the Configuration Operations Manager setup routine for VMM 2008 R2.  The setup fails at the Administrator Console stage with the following error:

<Problem>

"Setup was not able to retrieve the service account from the specified Virtual Machine Manager server.

Specify a different VMM server and then try the operation again.

ID: 10207"

I had this issue while setting up my lab environment for the book.  I’d never seen it before.  No matter what I did, it kept repeating and stuffed the schedule for a chapter, forcing me to move to the next chapter (after wasting 4 or 5 days).

I searched all over and found no help at all, but plenty of people who had seen this problem.  Some solutions included setting up the prerequisites.  I was 100% sure that I had done that: management packs, console installs, OpsMgr admin rights to the VMM service account, etc.  AD and accounts were all healthy.  I uninstalled and reinstalled VMM (retaining and reusing the database) and even created a new VMM server from scratch.

Eventually, I opened a call with MS PSS.  Within a couple of hours an engineer named Ganesh called me up – well ahead of the 8 hours SLA (nice!).  We fired up an easy assist session and went through all the steps.  We were both sure of a problem on the VMM side; OpsMgr was behaving perfectly.

Note: A handy troubleshooting step is to install a VMM Admin console on another machine and try that.  That can ID a cause of this issue – there appear to be many including dodgy DNS records and missing prereqs.   The setup log in the hidden (by default) ProgramData folder doesn’t give very much detail on the integration setup failure so you have to go through everything.

Ganesh wanted to look at the service account in ADSIEdit.  We browsed to it.  The first suspect was the SPN records.  SPNSETUP –L led us to believe everything was OK there.  We opened up the properties of the VMM service account and confirmed that.  However, when we expanded the service account we did notice something.  The SCP (it appears like a sub-folder in ADSIEdit under the VMM service account and is called CN=MSVMM) was missing.  This should be created by the VMM setup on the VMM server.

We reinstalled VMM on the VMM server once again.  Still no sign of the SCP.  This was a very unusual one.  Ganesh needed some time to do some research and to contact Redmond.

<FIX>

A day later I got an email from Ganesh.  There was a way to create the SCP.  Pop the VMM 2008 R2 media into the VMM server.  Browse to the <architecture>Setup folder using command prompt.  Run CONFIGURESCPTOOL.EXE –INSTALL from that folder.  This will create the SCP; I confirmed this in ADSIEdit.  I reran the integration setup and it completed perfectly.  After a while all of the VMM content started appearing in OpsMgr.

Note: If you do uninstall/reinstall VMM then make sure you patch it to the level it was at before.  Up-to-date VMM agents cannot communicate with out-of-date VMM servers.

Thanks to Ganesh over in PSS for your help!

New VMM 2008 R2 Rollup Update

Microsoft has just announced a rollup update for System Center Virtual Machine Manager 2008 R2.  It fixes:

  • A high availability virtual machine with a GPT pass-thru disk is reported is reported as “Unsupported Cluster Configuration.” 
  • When you manage VMware Virtual Center that has distributed switches, the Virtual Machine Manager service (Vmmservice.exe) crashes.
  • After Quick Storage Migration is completed, the Failover Cluster Management MMC snap-in reports that the VM still uses the old CSV volume.
  • If a VM is configured with 3 virtual processors, the SCVMM Admin Console crashes.
  • The settings for the virtual network are incorrect after a Refresh-VMHost cmdlet job is completed.

This update is being released through Windows Update.  That’s totally convenient and I love it.  Microsoft says that “if the Virtual Machine Manager or Virtual Machine Manager Agent service is running when the hotfix rollup package is installed on the Virtual Machine Manager server, you have to restart the computer”.

Technorati Tags: ,,

My Hyper-V Presentations at PubForum Frankfurt 2010

I’m exhausted.  I’ve done 2 presentations this week at Pubforum, one after the other with a quick break.  3 hours of me talking.  Phew – those poor people who had to listen to me!

I’ve posted both presentations.  As usual, they are only my cue cards.  Most of the content is me speaking or answering questions.

This is the 2 hour class that I presented:

And this is the one hour class that I presented:
 
 
 

The Lab for the Latest Chapter

The Mastering Hyper-V Deployment book covers enterprise Hyper-V deployments (and we have stuff for the smaller guys too).  That means dealing with all the possible environments that you can encounter.  Building the lab for that in my house was a challenge – I don’t have an enterprise budget so I cannot splurge on servers as required.  Appropriately, virtualization is being leaned on quite heavily.

Here’s what the lab looks like:

image

At the heart of it all is my Hyper-V laptop.  I’m running a different eSATA drive caddy than my usual demo one for these labs.  The virtual machines won’t fit on it so they are on a large USB 2.0 drive which I had sitting on a shelf.  There is a mix of Wired and Wifi networking.  My house isn’t CAT wired and I use wifi.  The VMware ESX host won’t do wifi so I’m using wired networking between it and the Hyper-V host where vCenter and VMM virtual machines are running.  The Hyper-V laptop is also the Hyper-V server in the labs.

Everything works pretty well.  The only downside is moving large files across wifi which is very slow… but that gives me a chance to take a break or get some sleep at night.

I work from my writing laptop.  From there I can RDP onto any of the Windows machines that are on the wifi network (no routing enabled on the Hyper-V host) or alternatively use Hyper-V/VMM/vCenter connections to get on any of the VM’s.  I can grab my screen shots, save them on the laptop and write away until the wee hours of the morning.

Microsoft Ireland – Best of #MMS2010

I arrived in about an hour late for this event because I had to present at a cloud computing breakfast event in the city.  Writing until midnight, doing work until 1am and getting up at 05:30 has left me a bit numb so my notes today could be a mess.

The ash cloud has caused last minute havoc with the speakers but the MS Ireland guys have done a good job adjusting to it.

System Center v.Next

I arrived in time for Jeff Wettlaufer’s session.

The VMM v.Next console is open with an overview of a “datacenter", giving a glimpse of what is going on.  We see the library and shares which is much better laid out.  It includes Server App-V packages, templates, virtual hard disks, MSDeploy packages (IIS applications), SQL DAC packages, PowerShell, ISO and answer files.

VMM v.Next

The VMM model is shown next.  We can create a template for a service.  This includes virtual templates for virtual machines: database, application, web, etc.  The web VM is shown.  We can see the MS deploy package from the library is contained within the template for this VM.  The web tier in the model can be scaled out automatically using a control for the model.  The initial instance count, maximum and minimum instance counts can be set.  The binding to network cards can be sent too.

An instance of this model is deployed: lots of VM’s are included in the model.  One deployment = lots of new VM’s.  We now see the software update mechanism.  The compliant and non compliant running VHD’s are identified.  Normally we’d do maintenance windows, patching and reboots.  With this approach we can remediate the running VM’s VHD’s.  Because there are virtualised services, they can be migrated onto up-to-date VHD’s and the old VHD’s are remediated. The service stays running and there are no reboots or maintenance windows.

This makes private cloud computing even better.  We already can have very high uptimes with current technology.  The only blips are usually in upgrades.  This eliminates that.  The model approach also optimises the

Operations Manager 2007 R2 Azure Management Pack

You can use an onsite installation of OpsMgr to manage Azure hosted applications.  This is apparently out at the end of 2010.  We get a demo starting with a model, including web/database services, synthetic transactions and the Azure management pack containing Azure objects (a web front end that fronts the on-premises databases).  We see the usual alert and troubleshooting stuff from OpsMgr.  Now we see that tasks for Azure are integrated.  This includes the addition of a new web role instance on Azure.  In theory this could be automated as a response to underperforming services (use synthetic transactions) but it would need to be tested and monitored to avoid crazy responses that would cost a fortune.

Almost everything in the System Center world has a new release or refresh in 2011.  It will be a BIG year.  I suspect MMS 2011 will be nuts.

It looks like I missed 4 of the demos :-(  That’s work for ya!

Configuration Manager v.Next– Jeff Wettlaufer

Woohoo!  I didn’t miss it.

The focus on this release is user centric client management.  The typical user profile has changed.  Kids are entering the workplace who are IT savvy.  The current generation knows what they want (a lot of the time).  MS wants to empower them.  Users should self-provision, connect from anywhere, access devices and services from anywhere. 

There should be a unified systems management solution.  Do you want point solutions for software, auditing, patching, anti-malware, etc.

Control is always important.  Whether it is compliance for licensing, auditing, policy enforcement, etc.  Business assets must be available, reliable and secure.  Automation must be employed and expanded upon to remove the human element – more efficient, allow better use of time to focus on projects, less mistake prone.

ConfigMgr 2007 does a lot of this.  However, it didn’t do the last step: remediating non-compliance with policy (software, security, etc).

Notes: 75% of American and 80% of Japanese workers will be mobile in 2011.  The IT Pro needs to change: be more generalized and have a variety of skills capable of changing quickly.  IT in the business has “comsumerized”: they are dictating what they want or need rather than IT doing that.  I think many admins in small/medium organizations or those dealing with executives will say that there has always been some aspect to that.  The new profile of user will cause this to grow.

System Center ConfigMgr is moving towards answering these questions.  The end user will be empowered to be able to self-provision.  Right now, the 2007 release translates a user to a device, and s/w distribution is a glorified script.  It is also very fire and forget, e.g. an uninstalled application won’t be automatically reinstalled so there isn’t a policy approach.

The v.Next method changes this.  It will understand the difference between different types of device the user may have.  It is more flexible.  It is a policy management solution, e.g. an uninstalled application will be automatically reinstalled because it is policy defined/remediated.

Software distribution in v.Next: relationships will be maintained between the user and devices.  User assigned software will be installed only if the user is the primary user of the device – save on licensing and bandwidth.  S/W can be pre-deployed to the primary devices via WOL, off-peak hours, etc.

Application management is changing too.  Administrators will manage applications, not scripts.  The deployments are state based, i.e. ConfigMgr knows if the application is present or not and can re-install it.  Requirements for an application can be assessed at installation time to see if the application should even be installed at all.  Dependencies with other applications can be assessed automatically too.  All of this will simplify the application management process (collections) and troubleshooting of failed installations.

For the end user, there is a web based application catalog.  A user can easily find and install application.  A workflow for installation/license approval can back this up.  S/W will install immediately after selection/approval – this uses Silverlight to trigger the agent.  A user can define what their business hours are in the client to control installations or pre-deployments.  They can also manage things like automated reboots – no one likes a mandated reboot (after 5 minutes) while doing something important, e.g. a live meeting, demo, presentation, etc.  This is coming in beta2: there will be a pre-flight check feature where you can see what will happen with an application if you were to target it at a collection.  You then can do some pre-emptive work to avoid any failures.  I LIKE that!

We now see a demo of a software package/deployment.  An installer package for Adobe Reader is imported.  This isn’t alien from what we know now.  There is a tagging mechanisms for searches.  We can define the intent: install for user or install for system.  You can add deployment types for an existing application.  We see how an App-V manifest is added to the existing application which was previously contained _just_ an MSI package.  Now you can do an install or an App-V deployment (stream and/or complete deployment) with the one application in ConfigMgr.  So we now have 2 deployment types (packages) in a single application.  This makes management much easier. 

We see that the deployment of the application can be assigned to a user and will only be installed to their primary device.  System requirements for the application can be included in the package.

A deployment (used to be called an advertisement) is started and targeted at a collection.  The distribution points are selected.  Now you can specify an intent, e.g. make the application available to the user or push it.  The usual stuff like scheduling, OpsMgr integration are all present.

SQL is being leveraged more and more.  A lot of the file system and copy operations are going away and being replaces with SQL object replication.  It also sounds like the ConfigMgr server components might be 64-bit only.

The MMC GUI is being dropped.  The new UI is more intuitive, better laid out and faster.  It will filter content based on role/permissions  in ConfigMgr.  This will make usage of the console easier.  Wunderbars finally make an appearance in ConfigMgr to allow different views to be presented: Administration, Software Library, Assets and Compliance, and Monitoring.

Role Based Administration: The MMC did cause havoc with this.  A security role can be configured.  This moves in the same direction as VMM and OpsMgr.  13 roles are built into the beta1 build.  You can bound the rights and access in ConfigMgr, e.g. application administrator, asset analyst, mobile device analyst, read only roles, etc.  We are warned that this might change before RTM.  Custom roles can be created.  When a role logs into the console they will see only what is relevant (permitted).  Current ConfigMgr sites did this by tweaking files on site servers which is totally not supported and caused lots of PSS tickets.

Primary sites are needed only for scale out.  The current architecture can be very complex in a large network.  Content distribution can be done with secondary sites, DP’s (throttling/scheduling), BranchCache and Branch Distribution Points.  Client agents settings are configurable in a collection rather than in a primary site.

Note: we see zero hands go up when we are asked if anyone is using BranchCache.  That’s not surprising because of the licensing requirements, the limit of not having upload efficiencies (compared to network appliance solutions) and limited number of supported solutions.

Jeff says that client traffic to cross-wan ConfigMgr servers dropped by 92% when BranchCache was employed – the distribution point can be BITS (HTTPS) enabled.

Distribution point management has been simplified with groups.  Content can be added based on group membershpip.  Content can be staged to DP’s, as well as scheduled and throttled.

SQL investments mean that the inbox is gone in v.Next.  Support issue #1 was the inbox.  There are SQL methods for inter-site communications.  SQL Reporting Services is going to be used.  SQL skills will be required.  MS needs to invest in training people on this.

ConfigMgr client health features have been expanded.  There is configurable monitoring/remediation for client prerequisites, client reinstallation, windows services dependencies, WMI, etc.  There are in-console alerts when certain numbers of unhealthy clients are detected – configurable threshold.

There is a common administration experience for mobile device management – CAB files can be added to ConfigMgr applications (not just App-V and MSI/installer).  Cross-platform device support (Nokia Symbian) is being added.  User centric application and configuration management will be in it.  You can monitor and remediate out of date devices.

Software Updates introduces a group which contains collections.  You can target updates to a group.  This in turn targets the contained collections.  Auto-deployment rules are being introduced.  Some want to do patch tuesday updates automatically.  You DEFINITELY need to auto-approve anti-virus/malware updates (Microsoft Forefront updates flow through Windows Updates).  Auto-approved updates will automatically flow out to managed clients.  This has a new interface but it’s a similar idea to what you get with WSUS. 

Operating System Deployment is a BIG feature for MS in this product.  We now get offline servicing of images.  It supports component based servicing and uses the approved updates.  This means that newly deployed PC’s will be up to date when it comes to updates.  There is now a hierarchy-wide boot media (we don’t need one per site and saving time to create and manage it).  Unattended boot media mode with not need to press <Next>.  We can use PXE hooks to automatically select a task sequence so we don’t need to select one from a list.  USMT 4.0 will have UI integration and support hard-link, offline and shadow copy features.  In 2007 SP2, these features are supported but hidden behind the GUI.

Remote Control is back.  Someone wants it.  I don’t see why – the feature is built into Windows and can be controlled by GPO.

Settings Management (aka Desired Configuration Management) is where you can define a policy for settings and identify non-compliance.  V.Next introduces automated remediation of this via the GUI.  This is an option so it is not required: monitor versus enforce.  Audit tracking (who changed what) is added.

Readiness Tips: Get to 64-bit OS’s ASAP.  Start using BranchCache.  Plan on flattening the hierarchy.  Use W2008 64-bit or later.  Start learning SQL replication.  Use AD sites for site boundaries and UNC paths for content.

A VHD with a 500 day time bombed VHD will be made available by MS in a few weeks.  Some hand-on labs will be made available soon after in TechNet Online. 

Can you see why I reckon ConfigMgr is the biggest and most complex of the MS products?

Operations Manager

Irish OpsMgr MVP Paul Keely did this session.  I missed the first half hour because I was talking to Jeff Wettlaufer and Ryan O’Hara from Redmond.  When I came back I saw that Paul was talking about the updates that have been made available for OpsMgr 2007 R2.  The demo being shown was the SLA Dashboard for OpsMgr.

Management pack authoring: “you need to have a PhD to author a management pack”.  This is still so true.

Using a Viso/OpsMgr connector you can load a distributed application into Visio.  You can then export this into SharePoint where the DA can be viewed on a site.

KB979490 Cumulative Update 2 includes support for SLES 11 32-bit and 64-bit and zones for all versions of Solaris.

V.Next: MS have licensed “EMC Smarts” for network monitoring.  An agent can figure out what switch it is on and then figure out the network. This means OpsMgr can figure out the entire network infrastructure and detect when a component fails. 

Management packs are changing.  A new delay and correlation process will alert you about the root cause of an issue rather than alert you about every component that has failed because of the root cause.  This makes for a better informed and clearer issue notification.

Opalis

This is a recent System Center acquisition for automated work flows.  The speaker was to fly in this morning but the ash cloud caused airports to close.  MS Ireland have attempted to set up a Live Meeting where the speaker can present to us from the UK.

The speaker is Greg Charman and is present in a tiny window in the top left of the projector screen.

We have a number of IT silos: SQL, virtualisation, servers, etc.  Applications or processes tend to cross those silos, e.g. SQL is used by System Center.  Server management relies on virtualization.  Server management and virtualization both use System Center.

Opalis provides automation, orchestration and integration between System Center.  Currently (because it was recently acquired) it also plugs into 3rd party products. Maybe it will and maybe it won’t continue to support 3rd party products in future releases.

Opalis provides runbook/process automation.  You remove human action from the process to improve the speed and reliability.  It also allows processes to cross the IT silos.

In the architecture, there is an Integrated Data Bus.  Anything that can connect to this can interact with other services (in theory).  Lots of things are shown: Microsoft, BMC, HP, CA, IBM, EMC, and Custom Applications. 

A typical process today: OpsMgr raises an alert.  Manually investigate if it is valid.  Update a service desk ticket.  Figure out what broke and test solutions.  Maybe include a 3rd party service provider.  All of these tasks take time and the issue goes on and on.

Opalis: sees the alert and verifies the fault.  It updates the issue.  It does some diagnostics.  It passes the results back to the service desk.  It might fix the problem and close the ticket.  At the least it could provide lots of information for a manual remediation.

Opalis is used for:

  • Incident management: orchestrate the troubleshooting.  Maybe identify the cause and remediate the issue.
  • Virtual machine life cycle management: Automate provisioning and resource allocation.  Extend virtual machine management to the cloud.  Control VM sprawl.
  • Change and control management: This integrates ConfigMgr and VMM.

The integration for some products will be released later in 2010.  The VMM and ConfigMgr integrations are in the roadmap, along with a bunch of other MS ones.

System Center Essentials 2010

This is presented by Wilbour Craddock.  As most companies in Ireland are small/medium, SCE 2010 should be a natural fit for a lot of them.  Remember that it is a little crippled compared to the full individual products.  It can manage up to 50 servers (physical or virtual) and up to 500 clients.

  • Monitor server infrastructure using the OpsMgr components.
  • Manage virtual machine using the VMM 2008 R2 components.  This include P2V and PRO tips.
  • Manage s/w and updates using the ConfigMgr components.

The “SCE 2010 Plus” SKU adds DPM 2010 to the solution so you can backup your systems.

Inventorying: Runs every 22 hours and includes 60+ h/w and s/w attributes.  Visibility is through reports.  180 reports available.  New in 2010: Virtualization candidates.

Monitoring includes network management with SNMP v1 and SNMP v2.  It uses the same management packs as OpsMgr.  Third party and custom ones can be added.  The product will let you know when there is a new MP in the MS catalog.

Only the evaluation is available as an RTM right now.  The full RTM and pricing for it will be available in June.

Patching is done with WSUS and this is integrated with the solution.  Auto-approval deadlines are available.  It can synch with the Windows catalogue multiple times in a day.  There is a simple view for needed updates.

SCE can deploy software but it cannot deploy operating systems.  You can use the free WDS or MDT to do this.  Note that a new version of MDT seems to be on the way.  The software deployment process is much simpler than what you get with ConfigMgr, thanks to the reduced size of the network that it supports.  It assumes a much simpler network.

At first glimpse of the feature list, it appears to include most of the VMM features, but it not not be as good as VMM 2008 R2.  It cannot manage a VMware infrastructure but it can do V2V.  Host configuration might be better than VMM.  P2V is different than in VMM.  The Hyper-V console is still going to be regularly used, e.g. you can’t manage Hyper-V networking in SCE 2010.  Enabling a physical machine to run Hyper-V is as simple as clicking “Designate as a host”.  PowerShell scripts are not revealed in the GUI like in VMM but you can still use PowerShell scripts.

Software deployment now include filtering, e.g. CPU type X and Operating System Y.  You can modify the properties of existing packages.

The setup is simple: 10 screens.  Configuration is driven by a wizard.

Requirements: W2k* or W2K8 R2 64-bit only.  2.8GHz, 4GB RAM, 150GB disk recommended.  It can manage XP, W2003, and later.

The server with DPM will be around €800.  Each managed device (desktop or server) will require a management license.  You can purchase management licenses to include DPM support or not.  This means you can backup your servers, maybe a few PC’s and choose to use the cheaper management licenses for the rest of the PC’s.

Intune

Will talks about this.  Dublin/Ireland will be included in phase II of the beta.  It provides malware protection and asset assessment from the cloud.  It will be used in the smaller organizations that are too small for SCE 2010. 

That was the end of the event.  It was an enjoyable day and a good taster of what happened at MMS.

Integrate VMM Maintenance Mode with OpsMgr

I like the idea of maintenance mode in System Center Virtual Machine Manager 2008 R2.  You simply put a host into maintenance mode and it uses Live Migration to flush all the VM’s to the most suitable hosts in the cluster.  Intelligent placement ignores that host until maintenance mode terminates.  You can then work away on it, e.g. patch it or do hardware maintenance.

The first time I tried it in anger in production I forgot to set maintenance mode in OpsMgr.  As you can expect, a few alerts went out and my boss contacted me pretty quickly.  That’s because VMM maintenance mode has nothing to do with Operations Manager’s maintenance mode.  OK – I’ll have to remember that from now on.

On a tangent: we patch almost everything automatically on a scheduled basis.  Scripts run on a scheduled basis to trigger maintenance mode.  That prevents most of the noise but still some gets through.  Our Hyper-V hosts are patched manually.  Live Migration enables this to be done during the day.

I watched the System Center Influencers (only) demo of the Virtual Machine Servicing Tool V3.0 beta the other evening.  It adds functionality to patch clustered W2008 R2 Hyper-V hosts in an automated scheduled basis.  Sweet!  It uses VMM to put each host, one at a time, in VMM maintenance mode and patches it.  Immediately I asked about OpsMgr.  There is no integration.

So I asked the question of MS and Michael Michael (MS VMM teams and author of Mastering Virtual Machine Manager 2008 R2) responded with a solution.  There is an OpsMgr 2007 and 2007 R2 management pack that will detect VMM 2008 R2 maintenance mode on your VMM server.  It will use this to put the relevant host into maintenance mode in OpsMgr.  Nice!

I’ve yet to test this so I cannot say how successful it will be.  I also don’t know if it will do anything to quieten down the Failover Clustering management pack which will create some noise when a clustered host reboots.  It should be noted that the developer provides it as is with no support statements.  That means it is not an official MS product.  Test it before you use it.

The Cloud Future of OpsMgr and VMM

There’s a lot of developments on the way for the next versions of Operations Manager and Virtual Machine Manager.  A lot of those are aimed at Azure integration.  You can read more about the future here.

Webcast: Understanding The Virtual Machine Servicing Tool

This is a webcast for the System Center Influencers.  I’ll do my best to blog as it goes along.  It follows the recent beta release of VMST 3.0.  This is the release I’ve been waiting for.  Prior to this, it really only handled VM’s stored in an offline state in the library.  But now there is patching for:

  • Offline virtual machines in a SCVMM library
  • Stopped and saved state virtual machines on a host
  • Virtual machine templates
  • Offline virtual hard disks in a SCVMM library by injecting update packages (DISM)
  • Automated patching of Windows Server 2008 R2 failover cluster hosts running Hyper-V (using Live Migration for zero VM downtime)

Now that’s what I’m talking about!!! We’re very slowly moving towards some of the cool patching functionality for templates that is in VMM v.Next.  That last one is a biggie!

The Challenges:

  • Dormant VM’s miss patch Tuesday.
  • When they wake up they are non-compliant and vulnerable to network threats.
  • Patching without VMST is a manual process which is a waste of effort.

OVMST 2.1

  • Works with stored VM’s in the VMM library
  • Patches via WSUS & ConfigMgr with VMM
  • Move VM to maintenance host, start VM, patch it, shutdown, move to library.
  • Uses VMM PowerShell cmdlets.
  • Supports Hyper-V and Virtual Server 2005 R2 SP1

VSMT 3.0 Beta

Note that it is no longer called the “Offline …” tool.  See the previous features for the reason why.

The offline VM process works as usual, by moving it onto a maintenance host, starting, patching, shutting down and restoring it to the library.

Demo of Configuration and Offline Servicing

We see a VMM library with offline VM’s and template VHD’s.  There are 2 hosts.  Some VM’s are stopped, some are in saved state.  One host is labelled as being a maintenance host.  The VMST GUI is the usual System Center MMC “wunderbar” GUI.  The VMM server is selected, along with ConfigMgr and/or WSUS.  The maintenance host is selected in the wizard.  Credentials for servicing offline VHD’s is entered.  Timeouts for copies and updates are also entered (be careful with service pack updates which can be VERY time consuming – lesson learned from SMS updating process back in 2005). 

You can create groups for VHD’s, from VM’s in the library, from VM’s in template groups, and from VM’s in host groups.  You now create a servicing job for selected VM’s from the group(s).  You can also specify if the VM should use its own configured virtual network or from a selected VLAN (maintenance network).  A schedule is entered for the job, e.g. now, later or on a recurring basis.  You can track the job process in VMST or in VMM.

Servicing Shutdown VM’s on a Host

The VM is moved from the production host to a maintenance host.  Here it is started and patched.  The VM is shutdown and returned to the original host.  The configuration is pretty similar, just using a “stopped VM group” instead.  You can include VM’s with a saved state – these VM’s will lose their saved state.  This is because the VM is powered (woken) up and powered down.

Patching Virtual Machine Templates

These are files stored in the VMM library along with metadata in the VMM SQL database.  Patching these requires using a different method.  VMST creates a “gold VM” from the template and maintains a mapping to it.  The gold VM is started on the maintenance host.  The gold VM is updated.  The gold VM is cloned (not moved or new template).  The cloned VM is sysprepped and replaced the template VHD.  The gold VM is left in place for the next patching.

In the demo, you can select a pre-existing VM from the template that you are going to maintain.  This means you need to deploy 1 VM from each 1 template you keep in the library.  You can choose to backup the template in the library (1 version only per template), just in case the patching breaks the template.

Patching Offline (not template) VHD’s

The VHD can be mounted using Diskpart on a maintenance host (not necc. Hyper-V: W7 or W2008 R2) and DISM is used to inject the update packages into the VHD.

Patching W2008 R2 Clustered Hyper-V Hosts

Must be W2008 R2 hosts and must be clustered.  It puts a host into VMM maintenance mode –> Live Migrates the VM’s to another host.  It patches the host and removes VMM maintenance mode.  The process repeats through the cluster nodes.

There is no integration with OpsMgr so you’ll need to configure a scheduled maintenance mode (by yourself) there for all of your hosts in the cluster to prevent all sorts of nasty alerts.

Summary

This was a good presentation – very demo focused which I like.  The product is now at a point where I think all VMM users should implement it.

Minasi Conference 2010 – My VMM 2008 R2 Presentation

I flew back home from Minasi Conference 2010 over the weekend.  The line up and variety of speakers was impressive. 

  • Roger Grimes (security guru at MS) pulled a Todd Lammle and scared the ***** out of us, basically saying that there’s no defence against most of the threats on the Internet now other than pure dumb luck.  For example, much of the advertising that is online contains attacks.  You might think you are on a safe site but they simply auction of advertising space which is infected.  A certain “fair and balanced” right-wing American news site was mentioned.
  • Steve Riley came and did a sales pitch on Amazon.  We go the stock answers on compliance with European data protection acts.  Sure – they won’t handover data to the US government when pressured to do so ;-)  Strange – Steve did mention that AWS does keep 30 days of your database transaction logs … purely for your own good, of course.
  • Eric B. Rux did a couple of sessions; one on Home Server and the other on getting into writing.  The latter was interesting because a number of us in the audience (authors, editors, journalists) were able to contribute.
  • Todd Lammle did a pre-conference training class that proved to be quite popular and extremely good value.  All attendees got two copies of his books.
  • Claus Neilson caused a few jaws to drop with his PowerShell presentation.  I was impressed with an audit script he had that populated an open spreadsheet in Excel.
  • Michael B. Smith did an afternoon on how to get from W2003 AD and Exchange 2003 to W2008 R2 AD and Exchange 2010. 
  • Laura E. Hunter (now joining MS internal IT) did a session on Forefront Identity Manager.
  • And of course, Mark Minasi did a few sessions, including (as usual) a preview of what he’s working on for future classes and the upcoming conference season.

I did a presentation on System Center Virtual Machine Manager.  It’s something that could take 2 days but I squeezed in the essentials into 70 minutes.  My slide deck is online at Slideshare (below).

Unusually for me, I was able to get this done a little ahead of time.  I did go through my demo (the end-to-end of a VM’s life cycle, templates, delegation, and self service) pretty quickly.  That allowed me to talk about where organizations can go in the future with Hyper-V.  Visual Studio empowers the tester/developer to work with Hyper-V via the environment/tools that they are comfortable with.  VMM v.Next’s new App-V for Servers support, patching without reboot potential for VM’s, and model deployment.  All this opened a few eyes.  The idea of self service from VMM 2008 R2 onwards really made quite a few people think because they hadn’t heard of it before – and I’m talking about respected MVP’s!

My slides are just a cue card for me so there’s not much content in there.  As you’ll see, I just mentioned the new features coming in W2008 R2 SP1 for Hyper-V.  There was no discussion on how the stuff works.  Keep an eye on the MS Virtualization blog and Ben Armstrong’s (Virtual PC Guy) for that info.  My animations won’t work in this either.  That’s a pity; they made Avatar pale in comparison.

JimiV Me at Minasi2010Picture by JimiV

A good time was had.  The newcomers all commented on how weird it was to be at an IT conference where there was a social atmosphere.  Most of us know each other at this event so there’s always something going on somewhere.

My next appearance will be at PubForum 2010 in Frankfurt in June.   It’s another “small” conference that is very low cost for the attendees.  The speakers are … wow!  There is a lot of stuff happening at it this year.  I’m doing a 2 hour class on Hyper-V best practices and I’m also doing a 1 hour session on the new stuff in Hyper-V.