Monthly Archive: February 2013

2

Installation Process of Hyper-V Replica

Hyper-V Replica is installed as part of the Hyper-V Role. Installation UI/Wizard To add the Hyper-V Role to a server installation, use the Add Role and Feature Wizard (ARFW), which is part of Server Manager or use the Deployment Image and Servicing Management (DISM) command line tool.  A reboot is required.  This can occur automatically if the installation is being executed in the Server Manager interface by checking a box...

0

Hyper-V Replica PowerShell CMDLETS

The following Hyper-V PowerShell cmdlets apply to Hyper-V Replica.   Cmdlet Complete-VMFailover Description This cmdlet completes the Failover process of the virtual machine. The virtual machine’s current recovery point is committed and all other recovery points are removed. Failover cannot be cancelled once the recovery points are removed. Verb-Noun Complete-VMFailover Syntax Complete-VMFailover [-VMName] <String> [-ComputerName <String[]>] [-PassThru] Example Complete-VMFailover -VMName C0-FIN-FS1   Cmdlet Get-VMNetworkAdapterFailoverConfiguration Description Retrieves the Failover IP settings on...

0

Dynamic Optimization on SCVMM 2012

SCVMM 2012 introduced the ability to constantly monitor and rebalance load on clusters by using “Dynamic Optimization”.  How Dynamic Optimization works, will help understand its behavior and get the most out of this feature. What does Dynamic Optimization do?  Simply put, it searches for live migrations within a Host Cluster that will improve the overall health of the cluster.  “Health” describes two main facets – Host load and VM configuration....

4

Multitenant security and isolation with Hyper 2012

Virtualized data centers are becoming more popular and practical every day. IT organizations and hosting providers have begun offering infrastructure as a service (IaaS), which provides more flexible, virtualized infrastructures to customers—“server instances on‑demand.” Because of this trend, IT organizations and hosting providers must offer customers enhanced security and isolation from one another. If you’re hosting two companies, you must help ensure that each company is provided its own privacy...