1. Trang chủ
  2. » Công Nghệ Thông Tin

ADVANCED SERVER VIRTUALIZATION VMware and Microsoft Platforms in the Virtual Data center phần 6 pot

82 369 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Advanced Server Virtualization VMware and Microsoft Platforms in the Virtual Data Center
Trường học University of Technology and Education
Chuyên ngành Server Virtualization and Networking
Thể loại thesis
Năm xuất bản 2006
Thành phố Hanoi
Định dạng
Số trang 82
Dung lượng 1,46 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Virtual Machine 3 has an identical network confi guration as Physical Server Hardware Layer VMware ESX Server Virtualization Layer Ethernet1 Ethernet1 Physical Network Switch Virtual Swit

Trang 1

between virtual network adapters connected to that virtual switch Th ere are

three virtual machines confi gured on this ESX Server Virtual Machine 1 has one

virtual network adapter that is connected to Virtual Switch 0 Network traffi c

from Virtual Machine 1 will be routed through Virtual Switch 0 and on through

vmnic0, if necessary Note that Virtual Switch 1 does not have a virtual network

adapter connected No traffi c will be present on Virtual Switch 1 and therefore

no traffi c will be present on vmnic1, the physical network adapter to which

Virtual Switch 1 is bound Virtual Machine 2 has two virtual network adapters

installed Th e fi rst virtual network adapter, Ethernet0, is connected to Virtual

Switch 2 and the second virtual network adapter, Ethernet1, is connected to

Virtual Switch 3 Virtual Machine 3 has an identical network confi guration as

Physical Server Hardware Layer

VMware ESX Server Virtualization Layer

Ethernet1 Ethernet1

Physical Network Switch

Virtual Switch Virtual Switch

Figure 17.13 VMware ESX Server Networking Components.

Trang 2

Virtual Machine 2 Th ese two virtual machines must be important because they

both have their external network connections bound to Virtual Switch 2 Virtual

Switch 2 is bound to bond0, which aggregates three physical network adapters

Bond0 could lose up to two physical network adapters without aff ecting the

connectivity to Virtual Machine 2 and Virtual Machine 3 Th e second virtual

network adapter in Virtual Machine 2 and Virtual Machine 3 are connected

to Virtual Switch 3, which is a private network because Virtual Switch 3 is not

bound to any physical network adapters in the server Virtual Machine 2 and

Virtual Machine 3 can communicate with each other over this link It is possible

that these two virtual machines are clustered and need a private network link in

order to monitor each other Th is diagram shows a fairly complex networking

scenario that is possible with ESX Server, although even more complex confi

gu-rations are possible

MAC Addresses

Virtual network adapters can have one or more IP addresses assigned to them

Th is is completely confi gured and controlled by the virtual machine’s guest

op-erating system Virtual network adapters must also have a MAC address just as

if it were a physical network adapter Physical network adapters have a

glob-ally unique MAC address permanently assigned to each card Because virtual

network adapters are created in software, their MAC addresses cannot be

per-manently assigned as in a physical network adapter Instead, the MAC address

is a confi gurable value assigned to each virtual network adapter either

dynami-cally by ESX Server or statidynami-cally by an administrator Dynamic MAC addresses

are automatically generated by ESX Server and static MAC addresses must be

confi gured explicitly by an administrator for each virtual network adapter that

requires a static MAC address Th e value of a virtual network adapter’s MAC

address is stored within the virtual machine’s confi guration fi le If a virtual

ma-chine has not been explicitly confi gured to use a static MAC address for a virtual

network adapter, it will have a dynamically generated MAC address assigned to

the virtual network adapter Th ere are three keyword/value pairs in the virtual

machine’s confi guration fi le that specify the dynamically generated MAC

ad-dress Th ey are as follows:

Ethernet<id>.addressType = “generated”

Ethernet<id>.generatedAddress = “00:0c:29:1e:

aa:94”

Ethernet<id>.generatedAddressOffset = “0”

Th e <id> token represents the id of the specifi c virtual network adapter For

virtual machines that have only one virtual network adapter, <id> usually equals

0 (Ethernet0) If a virtual machine has more than one virtual network adapter,

the <id> of each virtual network adapter is incremented by 1 A virtual machine

Trang 3

confi gured with two virtual network adapters will have a set of entries for

Ether-net0 and another set of entries for Ethernet1 in its confi guration fi le

Th e Ethernet<id>.addressType keyword/value pair defi nes the type of MAC

address that is assigned to the virtual network adapter Th is keyword/value pair

is used for dynamically generated MAC addresses and for static MAC addresses

If a dynamically generated MAC address is being used, the value is “generated.”

If a static MAC address is being used, the value is “static.”

Th e Ethernet<id>.generatedAddress keyword/value pair contains the actual

MAC address that has been dynamically generated and assigned to the virtual

machine Th is keyword/value is created automatically upon powering on the

virtual machine when then Ethernet<id>.addressType keyword has a value of

“generated.” In ESX Server, dynamically generated MAC addresses always use

00:0C:29 as the fi rst three bytes of the MAC address value Th is is one of two

Organizationally Unique Identifi ers (OUI) assigned to VMware for use with

virtual MAC addresses VMware’s other OUI, 00:50:56, is used for static MAC

addresses

Th e Ethernet<id>.generatedAddressOff set keyword/value pair is also required

when using dynamically generated MAC addresses and its value is usually zero

Th is keyword/value is created automatically upon powering on the virtual

ma-chine when then Ethernet<id>.addressType keyword has a value of “generated.”

Th is value is the off set used against the virtual machine’s UUID (Universally

Unique Identifi er) when generating MAC addresses

ESX Server uses an algorithm for generating dynamic MAC addresses that

at-tempts to create MAC address value unique not only within a single ESX Server,

but also across ESX Servers Each virtual machine has a keyword/value pair in

its confi guration fi le named uuid.location Th is keyword/value pair contains the

virtual machine’s UUID, which is a 128-bit (16-byte) numeric value that is

universally unique within its given context Th is means that no other virtual

ma-chines will have the same UUID, even across multiple ESX Servers around the

world UUID (also referred to as GUID for Globally Unique Identifi ers)

genera-tion is very common in many computing scenarios where an object should have

a unique name across all space and time In ESX Server, each virtual machine’s

UUID is based in part by the absolute path to the virtual machine’s confi

gura-tion fi le and by the ESX Server’s SMBIOS UUID If a confl ict occurs when

generating a dynamic MAC address on a single ESX Server, the Ethernet<id>

generatedAddressOff set value is incremented and the algorithm is generates a

new MAC address Th is iterative process repeats until a unique MAC address is

generated In almost all cases, the unique MAC address is generated on the fi rst

attempt It is important to note that ESX Server cannot check for confl icting

MAC addresses across multiple ESX Servers

Instead of relying on ESX Server to create unique MAC addresses, it is

pos-sible to confi gure static MAC addresses for each virtual network adapter Static

MAC addresses must be explicitly confi gured by an administrator to be used

Trang 4

Static MAC addresses in ESX Server must use the VMware OUI, 00:50:56 as

the fi rst 3 bytes of the static MAC address value Th is is in stark contrast to

Mi-crosoft Virtual Server, which allows any MAC address value to be used without

restrictions Furthermore, ESX Server limits the range of allowable values for the

fourth byte of static MAC addresses to the range 00 to 3F Static MAC addresses

must be within the following range: 00:50:56:00:00:00 to 00:50:56:3F:FF:FF

To confi gure a virtual network adapter to use a static MAC address, the

vir-tual machine’s confi guration fi le must be edited as follows

Remove the following keyword/value pairs:

Ethernet<id>.generatedAddressEthernet<id>.generatedAddressOffset

Edit the following keyword/value pair:

In the listing above, <id> is the Ethernet adapter number of the virtual network

adapter being confi gured with a static MAC address and <mac> is the value of

the static MAC address using the format: OO:UU:II:XX:YY:ZZ where OO:UU:

II represents the static MAC address OUI for VMware ESX Server, 00:50:56,

and XX:YY:ZZ represents the unique MAC address value from 00:00:00 to 3F:

FF:FF

To confi gure a virtual network adapter to use a dynamically generated MAC

address instead of a static MAC address, the virtual machine’s confi guration fi le

must be edited as follows

Remove the following keyword/value pairs:

Th e next time the virtual machine is powered on, the necessary keyword/value

pairs that support a dynamically generated MAC address will automatically be

Trang 5

added to the virtual machine’s confi guration fi le as well as the new, dynamically

generated MAC address value

In ESX Server, MAC address values are colon-delimited unlike Microsoft

Vir-tual Server where MAC address values are hyphen-delimited As a best practice,

the values of MAC addresses should be in all upper case Another best practice

is to confi gure static MAC addresses for all virtual network adapters in all virtual

machines and make the necessary confi guration updates before the fi rst time

that the virtual machine is powered on Th is reduces the chances of confi guring

the TCP/IP properties of a virtual machine with a dynamic MAC address and

then later changing it to a static MAC address and confusing the network switch

by ARPing the same IP address with two diff erent MAC addresses

It is extremely important that MAC addresses within a network are unique

It is a best practice to use a static, unique MAC address for every virtual

net-work adapter across all physical servers, ESX Servers, and virtual machines in

an entire data center Even though MAC addresses realistically only need to be

unique within an Ethernet collision domain, the isolation of some physical

net-work switch’s VLAN implementations can be suspect Also, within ESX Server,

although virtual switches do provide network isolation, if two isolated virtual

switches have virtual network adapters connected which have the same MAC

address, strange eff ects have been experienced even though the two confl icting

MAC addresses could never “see” each other Keeping all MAC addresses of all

virtual network adapters 100 percent unique is a good method of eliminating

potential and seemingly obscure network problems

To determine the MAC address of a virtual network adapter within a virtual

machine in the Service Console, open the virtual machine’s confi guration fi le

with an editor such as emacs, vi, or nano in order to manually search for the

MAC address value or use the cat command piped into a grep command such

Th e <confi g_fi le_path> token is the path to the virtual machine’s confi

gura-tion fi le Th e fi rst command will output only lines for virtual network adapters

containing a static MAC address and the second command will output only

lines for virtual network adapters containing a dynamically generated MAC

ad-dress for the specifi ed virtual machine

To determine the MAC address of the physical network adapter bound to

the Service Console, use the ifconfi g command and obtain the value from the

Trang 6

ifconfi g command’s output for eth0, fi eld HWaddr, or simply use the following

command:

# ifconfi g | grep eth0

Th e output from the command above should look similar to the following:

eth0 Link encap:Ethernet HWaddr 00:1C:03:B1:14:ED

Th e value following the string token, HWaddr, is the MAC address value of

eth0

Th e MAC address value of all physical network adapters allocated to the

VM-Kernel for use by virtual machines cannot be easily determined because they are

never used Th e physical server does not have a valid TCP/IP stack bound to any

of the vmnic network adapters, therefore their burned-in MAC addresses are

never broadcast to the network Virtual machines connected to virtual switches

that are bound to the vmnic network adapters have a TCP/IP stack bound to the

virtual network adapter bridged to the physical network adapter Th e vmnics act

like a bridge device in this context, connecting the external network to the

vir-tual networks within an ESX Server Th e MAC addresses of the virtual network

adapters are broadcast to the network and for those virtual network adapters

bound to external networks, their MAC addresses are broadcast to the physical

networks to which they are bridged

Promiscuous Mode

By default, virtual switches in ESX Server are not allowed to operate in

pro-miscuous mode Th is is done for security purposes, reducing the eff ectiveness

of using packet sniff er and network analyzer applications from within a virtual

machine In some cases, there may be a legitimate need to enable promiscuous

mode for a virtual switch Th is should be done with care Promiscuous mode can

be enabled on virtual switches that are bound to a physical network adapter or a

vmnet device When promiscuous mode is enabled for a virtual switch bound to

a physical network adapter, all virtual machines connected to the virtual switch

have the potential of reading all packets sent across that network, from other

virtual machines as well as any physical machines and other network devices

When promiscuous mode is enabled on a virtual switch not bound to a physical

network adapter (one that is instead bound to a vmnet device), all virtual

ma-chines connected to the virtual switch have the potential of reading all packets

sent across that network, that is, only from other virtual machine connected to

the same virtual switch Th ere is no method of permanently enabling

promiscu-ous mode for a virtual switch To enable promiscupromiscu-ous mode for a virtual switch,

a value is poked into a special virtual fi le in the /proc fi le system Th is means

that the value takes eff ect in memory only and is not persisted Upon the next

reboot of the ESX Server, the value will revert to its default value, which is to not

Trang 7

enable promiscuous mode Because the necessary virtual fi le in the /proc fi le

sys-tem only exists when a virtual switch is connected to either a physical network

adapter or a virtual network adapter, promiscuous mode can only be enabled on

virtual switches not bound to a physical network adapter when a powered-on

virtual machine has a virtual network adapter connected to the virtual switch

If a virtual switch not bound to physical network adapter has no live

connec-tions from virtual machines, the necessary /proc fi le does not exist and therefore

the value cannot be modifi ed Virtual switches that do have a physical network

adapter bound to it can have its promiscuous mode enabled or disabled at any

time Th erefore, one method of persisting a virtual switch to have promiscuous

mode enabled is to add the command that enables promiscuous mode to the

/etc/rc.local boot script in the Service Console

To determine if promiscuous mode is enabled or disabled, enter the following

command in the Service Console using an account with root-level access:

# cat /proc/vmware/net/<device>/confi g | grep PromiscuousAllowed

Th e <device> token represents the name of the network device being queried,

either a vmnic, a vmnet, or a bond For example, to query vmnic0 for its current

promiscuous mode state:

# cat /proc/vmware/net/vmnic0/confi g | grep PromiscuousAllowed

Th e <value> token must be no to disable promiscuous mode or yes to enable

promiscuous mode for the specifi ed <device> Th e <device> token represents the

name of the network device being queried, either a vmnic, a vmnet, or a bond

In the following example, vmnic0 is queried to determine if promiscuous

mode is enabled Next, a command is issued to enable promiscuous mode for

vmnic0 Finally, the command of the original query is executed again to

deter-mine if the promiscuous mode state has been changed for vmnic0

# cat /proc/vmware/net/vmnic0/confi g | grep PromiscuousAllowed

PromiscuousAllowed No

# echo “PromiscuousAllowed yes” > /proc/vmware/

net/vmnic0/confi g

Trang 8

# cat /proc/vmware/net/vmnic0/confi g | grep PromiscuousAllowed

PromiscuousAllowed Yes

If a vmnic or bond should have promiscuous mode enabled at all times, the

command to enable promiscuous mode for the particular device can be added at

the end of the/etc/rc.local boot script Th is fi le can easily be edited using emacs,

vi, or nano

VLAN Tagging (Port Groups)

Virtual switches in ESX Server support the use of VLANs, Virtual Local Area

Networks Th is feature is also referred to as Port Groups in ESX Server In the

networking community, VLANs are very common as they provide a method of

abstracting and isolating network segments from each other VLAN

technol-ogy is usually implemented in managed network switches It is no surprise to

discover that in ESX Server, VLANs are implemented as a feature of virtual

switches Th e term Port Groups is used synonymously with VLAN Tagging In

this context, the term port refers to a virtual Ethernet port in a virtual switch

and is not to be confused with the term port as it is used in TCP/IP VLAN

Tag-ging allows groups of ports in a switch to be bound together to form a virtual

local area network, or VLAN Th e groups of switch ports defi ned with the same

VLAN ID act as if they were on a dedicated switch and do not see traffi c from

other VLANs Th e VLAN Tagging feature in ESX Server allows connections to

virtual switches to belong to a VLAN, which can participate in VLANs external

to the ESX Server environment in the physical network By default, the VLAN

Tagging feature is enabled in the VMKernel, but is not used until one or more

Port Groups have been confi gured

Resource Management

ESX Sever provides very rich facilities for resource management of virtual

ma-chines, including the Service Console Th ere are several techniques used to

con-trol and shape the amount of resources allocated to virtual machines Th ese

techniques include:

Shares CPU affi nity Min/Max percentages Min/Max amounts Network traffi c shaping

Th e resource management techniques listed above may be used

independent-ly or in combination to achieve the desired amount of performance from virtual

Trang 9

machines Most virtual machines should not require resource tweaking Th e

re-source management features of ESX Server are designed to be applied to specifi c

virtual machines that have a high sensitivity to performance

Th e primary method used to control how much of a particular resource is

given to a virtual machine at a particular point in time is the use of shares Th e

shares system applies to CPU, memory, and disk resources By default, all virtual

machines are created with an equal number of shares for CPU, memory, and

disk Th e default number of shares allocated per resource per virtual machine is

1000 Using this default setting, all virtual machines receive the same amount

of resources Th e default value of 1000 is considered to be the normal amount

of shares Th e shares system of resource allocation is proportional; therefore if

the normal amount of shares is 1000, assigning 2000 shares of a particular

re-source for a virtual machine allocates double the amount of that rere-source for

that virtual machine relative to the other virtual machines that have the normal

amount of shares (1000) For example, consider an ESX Server with three virtual

machines: Vm1, Vm2, and Vm3 Vm1 has 2000 CPU shares, Vm2 has 1000

CPU shares, and Vm3 has 500 CPU shares Vm1 will receive twice the amount

of CPU cycles then Vm2 and four times as many CPU cycles as Vm3 VM3 will

receive half as many CPU cycles as Vm2 Th e same amount of CPU cycle would

be allocated to the virtual machines if the shares allocated were set to the

follow-ing values: Vm1 has 200 CPU shares, Vm2 has 100 CPU shares, and Vm3 has

50 CPU shares Th is is due to the proportional or relative nature of the shares

resource allocation system

Most ESX Servers run on multiprocessor hardware system such as dual

pro-cessor or quad propro-cessor servers It is possible to assign virtual machines to run

on specifi c processors Th is feature is called CPU affi nity By default, virtual

machines’ instructions are load balanced across all processors in the server ESX

Server’s scheduler determines which processors will execute particular

instruc-tions for virtual machines Using the CPU affi nity feature, it is possible to

con-fi gure a virtual machine to run only on specicon-fi c processors in the system Using

CPU affi nity greatly reduces ESX Server’s fl exibility in the scheduler to provide

optimum performance for all virtual machines

Another technique used to control resource allocation to virtual machines

is Min/Max percentages ESX Server uses Min/Max percentages with CPU

re-sources In this scheme, virtual machines can be confi gured to receive a

mini-mum and a maximini-mum amount of CPU cycle by the overall percentage of CPU

cycles available Th is is often used to guarantee that a virtual machine receives a

guaranteed minimum number of CPU cycles in order to avoid CPU starvation

issues Additionally, a virtual machine can be confi gured with a maximum of

less than 100 percent to limit the amount of CPU cycles allocated to the virtual

machine Th is is often confi gured on very low priority virtual machines to avoid

having those virtual machines consume too many CPU cycles Th e Min/Max

percentages can be used independently or together on specifi c virtual machines

Trang 10

as needed By default, virtual machines are created with a minimum CPU

per-centage of 0 percent and a maximum CPU perper-centage of 100 percent

ESX Server uses the Min/Max amounts technique in addition to shares to

control memory allocation for virtual machines Virtual machines are always

confi gured with an amount of memory Th is value is the virtual machine’s

maxi-mum amount of memory Memory is allocated to virtual machines as they

re-quire it, based upon their shares, and the state of the virtual machine Memory

can be reclaimed and reallocated dynamically by ESX Server when a virtual

machine is idle or frees up a block of previously allocated memory Some virtual

machines may require a minimum amount of memory to be always present

Virtual machines can have a minimum amount of memory allocated to them

Upon powering on the virtual machine, ESX Server will allocate the minimum

amount of memory to the virtual machine By default, virtual machines have a

minimum memory value of zero Th e more memory that is allocated as

min-imum memory to virtual machines reduces the eff ectiveness of ESX Server’s

memory management features

ESX Server uses only the proportional shares technique to manage disk

re-sources Disk resources are measured in terms of disk bandwidth for each

physi-cal disk or LUN, each represented by a vmhba Th e disk bandwidth is calculated

in consumption units in which each SCSI command equals on consumption

unit and the size of the data to be transferred is converted into a proportional

number of additional consumption units Additionally, each virtual machine

may, by default, issue up to eight SCSI commands before being preempted by

another virtual machine requesting disk access

Network bandwidth resources are managed in a much diff erent manner than

other resources Instead of using the proportional shares or Min/Max

meth-ods, network bandwidth is controlled by a pluggable network packet fi lter

mod-ule ESX Server ships and supports only one fi lter module at this time named

nfshaper Th is module implements a transmit fi lter that performs network traffi c

shaping on outgoing traffi c Th e nfshaper module can be attached and confi

g-ured for each virtual machine Th e traffi c shaping feature implemented by the

nfshaper module can be used to limit the average bandwidth, peak bandwidth,

and the maximum burst size measured in bits per second (bps)

Performance Optimization

Here are some best practices that can be used to gain optimum performance for

virtual machines hosted on an ESX Server:

Ensure that the proper guest operating system type is confi gured for each virtual machine, Ensure that VMware Tools is properly installed and is up

to date in each virtual machine Before placing a virtual machine running Windows into production, defragment all virtual hard drives attached to

Trang 11

the virtual machine Confi gure virtual machines that run time-dependant

services to have a minimum amount of CPU allocation to prevent CPU

starvation Disable or remove virtual hardware devices that are not needed

or used by the guest operating system in each virtual machine Stop and

disable any unneeded services or daemons Disable and software and

oper-ating system features that are not needed in the guest operoper-ating systems in

each virtual machine In Windows guest operating systems, disable screen

savers, desktop backgrounds, and whiz-bang eff ects such as fading or

slid-ing menus In Linux guest operatslid-ing systems, disable the X server if

pos-sible

Allocate an exact amount of memory to each virtual machine

Another technique used to improve performance of virtual machines in

ESX Server is to confi gure the maximum amount of memory for each

virtual machine as the minimum amount of memory Th is will eff ectively

counteract the benefi ts of memory overloading in ESX Server and care must

be taken to not allocate more memory than is physically available in the

system (total amount of system RAM – 1GB is a good rule of thumb) Th is

technique causes ESX Server to allocate an exact amount of physical RAM

for each virtual machine upon powering on the virtual machine Th e

allo-cation process occurs slowly until the maximum amount of Ram has been

allocated Th is improves overall system performance because the VMKernel

does not have to dynamically resize the amount of memory for virtual

ma-chines Ensure that the Service Console is confi gured with enough memory

It is important to ensure that the Service Console has enough memory

allocated relative to the number of virtual machines running concurrently

and the number and types of system management and backup agents

Mware recommends 192MB for systems hosting up to 8 virtual machines,

272MB for up to 16 virtual machines, 384MB for up to 32 virtual

ma-chines, and 512MB for more than 32 virtual machines Th is

recommenda-tion does not consider the amount and type of system management and

backup agents that may be installed and running in the Service Console

As a best practice, confi gure an amount of memory for the Service Console

that is at least one step higher than the recommended amount of memory

for the amount of virtual machine that will be hosted If the system will

have more than 50 virtual machines registered, it is recommended to

con-fi gure the maximum amount of memory for the Service Console, 800MB

Close all unused VMRC application windows as soon as possible Each

VMRC application window consumes CPU resources in the Service

Con-sole while it is connected It is highly recommended to only open VMRC

windows as needed and close them as soon as possible Do not leave idle

VMRC windows open for long period of time Do not run CPU-intensive

applications within the Service Console Although the Service Console is

designed to run system management and backup agents, it is not designed

Trang 12

for heavy processing loads Th e Service Console is a virtual machine itself which runs on CPU0 Although its CPU resources can be modifi ed to enhance the Service Console’s performance, it is recommended to keep programs with heavy processing loads out of the Service Console Reduce the density of virtual machines running on each ESX Server If there are many virtual machines running on one ESX Server that are consuming and severely competing for CPU, memory, or disk resources, consider re-ducing the density of virtual machines on the ESX Server by moving some

of the virtual machine to another ESX Server Although ESX Server is highly optimized and can run many virtual machines concurrently, it is still possible to stress one or more resources by having heavy processing virtual machines

Summary

VMware ESX Server contains an amazing amount of features that can be used

to create advanced virtualized systems in the data center Th is chapter covered

the most important advanced features that allow administrators and system

en-gineers to quickly become familiar with ESX Server so that eff ective solutions

can be quickly developed By far, this chapter is not a defi nitive study into every

advanced feature and capability of ESX Server because that amount of

knowl-edge could easily fi ll many volumes More detailed technical information on

VMware ESX Server is available at http://www.vmware.com/vmtn/resources/

esx_resources.html Th is site contains links to documentation, white papers, and

technical briefs regarding the current release of ESX Server VMware ESX Server

is continuously being advanced and many new advanced features are likely to be

supported in the next major product release from VMware (ESX Server 3.0)

Trang 14

Implementing VMware

GSX Server

Trang 16

The VMware GSX Server

Platform

VMware GSX Server is a widely distributed server virtualization platform,

used mostly in smaller workgroup-sized server implementations Available for

both the Linux and Microsoft Windows platforms, this chapter will introduce

the platform by detailing the history and background of the product as well

as discussing the hardware and software requirements for both editions of the

product

Product Background

In 1999, VMware launched the release of their fi rst product now known as

available virtualization platform on the x86-based architecture In the years

fol-lowing its release, VMware has continued to mature their product line based

around their patented virtual machine technology Near the end of 2000,

VM-ware signifi cantly added to their product line by announcing VMVM-ware GSX

Server product to create a powerful, stable, and scalable server virtualization

platform As an added bonus, GSX Server also provides a direct upgrade path to

VMware ESX Server, VMware’s most powerful and scalable server virtualization

product and is itself an upgrade path for VMware Workstation users In April

of 2004, VMware announced their 64-bit roadmap for virtualization With the

release of GSX Server 3.1, VMware completed the fi rst milestone for their

sup-port of 64-bit computing It was the fi rst x86 server virtualization product to

be released that added support for 64-bit host operating systems, which means

Trang 17

there are 64-bit drivers present that allow installation of the product on x86

does, however, make it possible to upgrade to 64-bit host operating systems and

continue to run existing 32-bit operating systems in virtual machines With the

introduction of support for 64 bit guest operating systems within the VMware

Workstation 5.5 release, it is only a matter of time before GSX Server adds

of-fi cial support as well

VMware GSX Server is enterprise-class virtual infrastructure software

de-signed to run on the x86-based server architecture GSX Server transforms

application on a host operating system to provide a secure, uniform platform to

easily deploy, manage, and remotely control multiple servers running as virtual

machines Guest operating systems and applications are isolated within multiple

independent installations of Microsoft Windows, Linux, or Novell server

oper-ating systems and their applications can run side by side on a single x86 server,

and at the same time, save on hardware and management costs Since VMware

GSX Server gives the VM direct access to the host server’s resources (such as

processor, memory, and disk), virtual machines deliver near-native performance

System resources are then allocated out to any virtual machine based on need to

deliver maximum capacity utilization

GSX Server is installed on a physical server that is running either Microsoft

con-fi gured within the software much like a physical server would be An operating

system, known as a guest operating system, would then be installed on the

including standard Microsoft Windows and Linux operating systems VMware

GSX Server handles the task of abstracting the real hardware and providing a

ma-chine has its own virtual hardware, including a single processor system with an

Intel 440BX motherboard complete with a Phoenix BIOS (version 4.0, release

6.0) Depending on the host server’s capacity, up to 3.6GB of memory can be

allocated to a virtual machine Each virtual machine can also receive a SVGA

graphics card, up to four IDE devices, up to 21 SCSI devices across three virtual

SCSI controllers, up to two 1.44 MB fl oppy drives, up to four serial ports, two

parallel ports and two 1.1 USB ports, as many as four virtual Ethernet cards

and a virtual keyboard and mouse Almost any physical device supported by

the host operating system can be made available to a virtual machine as long

as GSX Server supports it; GSX Server has the broadest device support among

all other virtual machine software Another advantage to using GSX Server is

the ability to either bridge virtual LAN interfaces directly to the physical

net-work adapter or to create up to nine virtual Ethernet switches Creating virtual

Trang 18

Ethernet switches allows for better network isolation and faster communication

between virtual machines

An included suite of management tools makes confi guring and managing

vir-tual machines an easy task For local management and confi guration, VMware

GSX Server provides the VMware GSX Server Management Console that runs

stop-ping, starting, rebooting, and suspending virtual machines It also allows the

vir-tual machine to be viewed in full screen mode, which makes the virvir-tual machine

faster because it has exclusive access to the VM One of the strengths of GSX

Server is that it also allows for remote management VMware provides either a

Web-based management interface (connecting at http://<hostname>:8222) or

the VMware Remote Console interface that can be installed on a user’s desktop,

giving the user the ability to view the virtual machine’s display at another

com-puter and controlling it across the network Both the Web interface and the

remote console support secure connections via SSL In addition to the remote

management interfaces, VMware also provides a VmCOM scripting API and a

VmPerl Scripting API to automate the GSX Server management tasks

Over the years, virtualization has continued to mature and therefore gain

acceptance within the IT community With the improvements that VMware has

made to the GSX Server product, VMware has been able to earn a place in the

software testing and development space within many organizations because of

the speed and ease with which an environment can be created, discarded, and

recreated By utilizing these same techniques, VMware was also able to expand

into software training and software demonstrations Additionally, the

improve-ments made to the product have dispelled any fears of using it to implement

departmental server consolidation for both new and legacy applications

VMware GSX Server for Linux—Th e host operating system this version installs on must be one of the supported fl avors of the Linux operating system discussed below

Each product is independent of the other If both host operating systems are

needed, then both versions of VMware GSX Server must be purchased While

both products can be found on the same installation CD-ROM, each product

has its own serial number and one cannot be used to install the other

Trang 19

In addition to versioning the product by host operating system, VMware also

further breaks the product down by versioning against the number of processors

found within the host server VMware sells these products, the Windows version

and the Linux version, with the following CPU restrictions:

GSX Server 2-CPU license: for smaller servers running either a single

pro-cessor or a dual propro-cessor confi guration

GSX Server Unlimited CPU license: supports larger servers with up to 32

CPUs

core (or multi-core) processor, it will not aff ect the CPU

the host operating system as a quad processor server, VMware is only

con-cerned with the number of physical processors per socket when

determin-ing licensdetermin-ing packages

VMware GSX Server has the broadest hardware compatibility and support for the largest array of guest operating systems

of any x86 server virtualization platforms on the market (see Figure 18.1)

Hardware Requirements

Processor

VMware GSX Server supports as many as 64 virtual machines running

concur-rently on a single host server with as many as 32 processors VMware

recom-mends that no more than four virtual machines should be run concurrently

per physical processor Ultimately, that number should be determined by the

resource needs of the guest operating systems and their applications If the guest

operating system has a small footprint when it comes to resources needed, such

as a small Linux machine, then more virtual machines could be executed against

the processor If on the other hand, the virtual machine contains a CPU

in-tensive application, such as a Microsoft SQL database, then fewer virtual

ma-chines can be executed against the processor Chapter 7 gives additional details

on how to properly size the deployment on a host server However, based on the

minimum recommendations of VMware, GSX Server does not require a lot of

pro-cessor running at a speed of 733 MHz or faster While this may be the minimum

recommendation, it is certainly nowhere near optimal, and as is true with most

applications, the faster the processor the better

Trang 20

VMware GSX Supported Guest Operating Systems

GSX Server is compatible with standard 32-bit IA-32 processors and also

processors that implement IA-32 64-bit extensions such as AMD’s Opteron and

Athlon 64 processors and the Intel Xeon EM64T processor when used with

supported 32-bit host operating systems VMware GSX Server 3.2 does not

cur-rently support the Intel Itanium processor

Memory

When considering memory requirements for the host server, it is important to

keep in mind that enough memory is needed to run the Microsoft Windows

or Linux host operating system, along with enough memory for each virtual

machine’s guest operating system and the applications running on both the host

be-cause the lack of adequate memory will limit the number of virtual machines

that can run concurrently or for that matter can be run at all Also keep in mind,

Figure 18.1a GSX Server Supported Guest Operating Systems.

Trang 21

a guest operating system on a virtual machine will require the same amount of

operating system normally takes a minimum of 512MB of memory to run

ef-fectively, then the virtual machine will require the same amount of memory

VMware’s recommended minimum amount of memory is 512MB

How-ever, in reality, this is probably just enough memory for a Windows host server

with the GSX Server software installed and almost no memory left over for a

mem-ory installed inside of the host server, the better Keep in mind, however, the

maximum supported amount of memory for a host server is 64GB for Windows

and Linux hosts that support large memory or PAE mode, 4GB for non-PAE

mode Windows hosts and 2GB for Linux hosts with kernels in the 2.2.x series

Disk

VMware GSX Supported Guest Operating Systems Guest Operating System CPU Architecture

Figure 18.1b GSX Server Supported Guest Operating Systems.

Trang 22

requires 130MB of free disk space to install server, the management interface,

the virtual machine console installation, and both scripting packages, VmPerl

does not install the VmCOM scripting package because it only works with

Win-dows VMware also recommends the Linux version should have free disk space

in the /tmp folder equivalent to 1.5 times the amount of memory found on the

host server Finally, VMware recommends at least 1GB of disk space allocated

for each virtual machine created For a Linux virtual machine, this may be

ap-propriate; however, a Microsoft Windows server installation will greatly surpass

this amount Chapter 7 provides further details on the proper way to size and

evaluate hard disk subsystems

One thing to keep in mind, the suspend VM function will require additional free disk space If this feature is used, it will take up approximately the same amount of free disk space as

ere-fore, a virtual machine with 1GB of memory will consume approximately

1GB of disk space when the suspend feature is activated

Network

GSX Server will support any Ethernet controller card that the host operating

system supports

While host operating systems do not require permanent network

connectiv-ity, from a practicality stand point, one or more network cards should be present

to have true server class functionality Specifi c details and options for

recom-mended confi gurations are provided in chapter 7 and GSX Server networking

interfaces are discussed in detail in chapter 22

Display

Obviously, a graphics adapter for the host server will be needed and VMware

recommends a 16-bit color or better display adapter In Windows, the color

palette should be set to 65536 colors or true color to allow for the best

perfor-mance However, it is possible to get by with anything greater than a 256 color

(8-bit) display adapter Unfortunately, while this may work, it probably will

not function up to expectations One fi nal additional requirement for Linux

host servers is an X server that meets the X11R6 specifi cation, such as XFree86,

and a video adapter supported by the host server to run virtual machines in full

screen mode If an X server is not installed, then one must be installed VMware

recommends XFree86 version 3.3.4 or higher, with XFree86 version 4.0 being

the preferred choice

Trang 23

Software Requirements

Host Operating System

GSX Server provides a wide range of choices for host operating system

require-ments (see Figure 18.2) When installing the VMware GSX Server for Windows

product, there are two sets of choices, 64-bit hosts and 32-bit hosts To take

advantage of a 64-bit host server, VMware off ers support for the Microsoft

Win-dows Server 2003 x64 Edition operating system Additionally, 32-bit servers

may also choose between Microsoft Windows Server 2003 (Web, Standard, and

Enterprise including SP1) and Microsoft Windows 2000 Server or Advanced

Server with either service pack 3 or 4 installed When installing the VMware

GSX Server for Linux product, there are many more choices available Most of

the major Linux distributions that have been released recently are supported

Specifi cally, for 64-bit host servers, SUSE LINUX Enterprise Server 8 or one of

the three Red Hat Enterprise Linux 3.0 versions: AS, ES or WS GSX Server 3.2

adds experimental support for Red Hat Enterprise Linux 4, Red Hat Enterprise

Linux 3 Update 4, SUSE LINUX Enterprise Server 9 Service Pack 1 and SUSE

LINUX 9.2 and 9.3 For 32-bit servers, it is important to check the most recent

list on the VMware support site

Linux versions not listed may work However, VMware will not support it and the trouble of trying to tweak and trouble-shoot it may not be worth the eff ort It is therefore best to stick with a supported operating system

VMware Management Interface

man-agement interface to function correctly First, Microsoft Internet Information

Server (IIS) version 5.0 or 6.0 must be installed Second, one of the following

browsers must be used to view and interact with the management interface:

Microsoft Internet Explorer 5.5 or 6.0, Netscape Navigator 7.0, Firefox 1.x,

inetd process must be confi gured and active to allow connections and it also has

browser requirements, either Netscape Navigator 7.0, Firefox 1.x, or Mozilla

1.x must be used Other Web browser software may work, and VMware is

con-stantly updating the product’s requirements

GSX Server Scripting

One of the key features of GSX Server is the ability to automate and script

custom management and control functionality In order to use the VmPerl API,

both the Windows and Linux versions require the installation of Perl 5.005x or

higher

Trang 24

VMware GSX Supported Host Operating Systems

Host Operating System CPU Architecture

Microsoft Windows Server 2003 Enterprise Edition 32-bit

Microsoft Windows 2000 Advanced Server, Service Pack 3 and Service

Microsoft Windows 2000 Server, Service Pack 3 and Service Pack 4 32-bit

Mandrake Linux 9.0, stock 2.4.19-16mdk, update 2.4.19-32mdk kernels 32-bit

Red Hat Enterprise Linux 3.0 AS, stock 2.4.21-4, update 2.4.21-9,

Red Hat Enterprise Linux AS 2.1, stock 2.4.9-3, 2.4.9-e.24summit, update

Red Hat Enterprise Linux ES 2.1, update 2.4.9-16, 2.4.9-e.24summit,

Red Hat Enterprise Linux WS 2.1, update 2.4.9-16, 2.4.9-e.38, 2.4.9-e.40

Trang 25

VMware GSX Supported Host Operating Systems

SuSE Linux Enterprise Server 8, stock 2.4.19, update 2.4.21-138,

SuSE Linux Enterprise Server 7, stock 2.4.7 and patch 2, update

SUSE LINUX 9.0, stock 2.4.21-99, update 2.4.21-166 kernels 32-bit

SuSE Linux 8.1, update 2.4.19 update 2.4.19-175 kernels 32-bit

SuSE Linux 7.3, stock 2.4.10, update 2.4.18 kernels 32-bit

Turbolinux Server 8.0, stock 2.4.18-1, update 2.4.18-17 kernels 32-bit

Turbolinux Workstation 8.0, stock 2.4.18-1, update 2.4.18-17 kernels 32-bit

Turbolinux Server 7.0, stock 2.4.5-3, update 2.4.18-17 kernels 32-bit

Red Hat Enterprise Linux 3.0 AS — update 2.4.21-15 kernel 64-bit

Red Hat Enterprise Linux 3.0 ES — update 2.4.21-15 kernel 64-bit

Red Hat Enterprise Linux 3.0 WS — update 2.4.21-15 kernel 64-bit

SuSE Linux Enterprise Server 8 — stock 2.4.19, update 2.4.21-138 and

Figure 18.2b GSX Server Supported Host Operating Systems.

Additional Software Components

Other Linux host operating system requirements include:

Linux kernel 2.2.14-5.0 is specifi cally not supported

Standard Linux server installation is required with glibc version 2.1 or

higher and libXpm.so

Th e inetd process must be confi gured and active for VMware Virtual

Ma-chine Console and VMware Management Interface connections

Trang 26

Version 2.1.36 of the SCSI Generic driver (sg.o) is required to use generic SCSI devices in virtual machines.

X Server is required to run the VMware Virtual Machine Console

Summary

VMware GSX Server is a well established server virtualization platform Since

its inception, the product has undergone a number of updates and upgrades

to become one of the most powerful, stable and scalable server virtualization

platforms It off ers broad compatibility and support to both the host operating

system and the guest operating system It is one of the few platforms on the

mar-ket that will install on either Linux or Windows and the number of supported

guest operating systems, to say the least, is impressive No other platform comes

close to the wide range of operating system support that even includes 64-bit

operating systems VMware’s licensing mechanism for GSX Server is based on

the host operating system as well as the number of physical processors located

in the host server It not only has a simple to follow licensing methodology, but

the hardware and software requirements are also easily met For such a robust

application, the VMware minimal requirements should certainly be found in

most servers that are in use today However, like most applications, the minimal

requirements found here probably look good on paper, but in reality, more is

better and more resources should be dedicated to properly handle a virtualized

environment

Trang 28

Installing VMware GSX

Server

Installing VMware GSX Server on either a Windows or Linux server should be

no more complicated than installing many other types of applications on either

operating system Th is chapter will cover the requirements of the product as well

as information on the installation and basic confi guration of the physical host

server and the host operating system It will then walk through a step-by-step

installation of GSX Server Because the Windows and Linux platforms are so

signifi cantly diff erent in their installation process, the chapter will be divided

into two sections: the fi rst section will cover GSX Server for Windows followed

by information on GSX Server for Linux

GSX Server for Windows Requirements

Before executing the master installer, there are a few important things to keep

in mind GSX Server will not install on a host server that already has a version

of VMware Workstation or VMware ACE installed If either is already installed,

it must be removed or uninstalled from the host server before installation of

GSX Server can begin Additionally, multiple versions of GSX Server cannot

be installed on the same host server If a previous version or build of the

prod-uct already exists on the host server, then the upgrading GSX Server section in

chapter 23 should be followed, otherwise, the previous installation should be

uninstalled before continuing Finally, if another version of the VMware Virtual

Machine Console application is installed, it too must be removed before

install-ing GSX Server Th is not only includes any previous version of the GSX Server

console but also includes any console installation from another platform such as

VMware ESX Server

Trang 29

In order to install GSX Server, either the local Administrator user or a

lo-cal user with administrative privileges must be logged on Th e product should

not be installed by a Windows Server 2003 domain account, nor should it be

installed on a Windows 2000 Server Active Directory domain controller Th ese

account restrictions are only for installation of the product Once installed, the

product can be initiated and run by a user with normal user privileges

Preparing the Host Server

Preparing the host server is the fi rst in a critical series of steps ensuring that the

system will be stable and provide adequate performance Because a virtualization

host server will by its very nature be placed under a heavier load than a normal

server, it is important to properly tune the server for the most optimal

perfor-mance possible Th ere are many articles and white papers on the Internet that

speak on the subject of performance tuning a server Th is section will attempt

to provide a number of options that may be benefi cial Because all operating

systems and servers are not identical, these options should be tested before

us-ing them in a production environment Assumus-ing the server has had its internal

hardware components installed and the server has been racked:

Ensure the server is properly cabled with the necessary power cables Dual

power supplies connected to separate power leads is preferred

Connect any KVM type solution to the host server for remote management

Connect all Ethernet ports that will be used (unused ports can also be

con-nected if desired)

Upgrade to Gigabit Ethernet, if possible

Team multiple network adapters for best performance

Download and install the latest BIOS and then confi gure its settings

ap-propriately

Download and upgrade any fi rmware that needs to be updated

Confi gure the RAID controller

1 Confi gure the RAID controller for optimized write operations

2 A multi-channel controller card should be confi gured with one channel

confi gured as a mirrored pair for the operating system and the other channel confi gured as RAID 5 with four or more drives in the RAID set if possible for the virtual machines

3 Th e default stripe size is acceptable

4 Assign physical hard drives

5 Create logical volumes

Delete all existing partitions including any server manufacturer's support

partition

Format using a high-performance fi le system such as NTFS

Install and confi gure the host operating system

Trang 30

Preparing the Host Operating System

Th e host operating system is the next critical step in building the proper

plat-form for GSX Server Th e detailed steps involved with installing the host

operat-ing system will not be covered in this book It is assumed that a basic level of

understanding and experience with installing the server operating system already

exists Th e proper confi guration along with all required steps is covered below

Microsoft Internet Information Server (IIS) 5 or 6 must be installed and the services must be started and operating without errors

Ensure that the Physical Address Extension (PAE) option is set in the boot

ini fi le if greater than 4GB of memory is being used

Confi rm the correct amount of memory is being reported by the host erating system

Ensure that the paging fi le is of adequate size

Stop any unnecessary services

Install only the necessary packages and applications rather than loading down the host operating system It should only serve as the virtualization platform

If a software fi rewall is installed on the host operating system, ensure ports

902, 8222, and 8333 are open to allow a connection to the management interface or to the console

Update the Windows host server with the latest updates and patches

Disable all protocols and services except "VMware Bridge Protocol" on Ethernet ports that will be used exclusively by virtual machines

Defragment the host operating system's hard disks

Clear all event logs in the event viewer

Set the system's advanced performance settings for the processor to be optimized for background services

Set any antivirus software to skip scanning the virtualization install path, virtualization program fi les, confi guration fi les or virtual hard disk, fl oppy and CD-ROM image fi les It may also be a good idea to turn off real-time virus scanning or only scan modifi ed fi les Another option is to allow for a nightly scan or confi gure it to perform a full scan on the weekend

Installing VMware GSX Server for Windows

Th e VMware GSX Server for Windows master installer is very similar to most

Windows application installations Th is section will include step-by-step

instructions with screenshots that clearly depict what installation choices are

available and being chosen, specifi c descriptions of each screenshot and the

rea-sons why each choice is being made as well as what other choices are available

and what they do

Trang 31

As a best practice, no other applications should be running during the installation of the product It is also important to note, GSX Server must be installed on a local drive and not across a network share.

Th ere are two ways to start the GSX Server installation, either by CD-ROM

or a downloaded fi le If installing from the CD-ROM, click the Windows start

button and select Run Enter Z:\Windows\VMware-gsx-server-installer-<xxxx>

exe, where Z: is the drive letter for the CD-ROM drive and <xxxx> is the series

of numbers representing the version and build number of the product

If installing from a downloaded fi le, click the Windows start button and

select Run Browse to the location where the downloaded fi le was saved As

above, the fi le should be named VMware-gsx-server-installer-<xxxx>.exe, where

<xxxx> is the series of numbers representing the version and build number of

the product

Th e latest distribution of the product should be downloaded from VMware’s Web site at http://www.vmware.com in the download section Be prepared to log in with your customer account and password before being allowed to download the binaries If

you have not already done so, you should create a customer account and

register your product’s serial number Registering your serial number and

creating a customer account will also help in the future when needing

VMware technical support

When the installation fi le is executed, the master installer screen will launch

(see Figure 19.1)

Th ere are only two choices at this point, to continue the installation by

click-ing Next, or to cancel and exit the installation by clickclick-ing Cancel Click Next

to continue

Figure 19.1 VMware GSX

Server Master Installer

Welcome Screen.

Trang 32

Th e end user license agreement (EULA) page is displayed (see Figure 19.2)

Th e license agreement contained here should be read very carefully Choosing

the radio button labeled “I accept the terms in the license agreement” is a legally

binding agreement If the radio button labeled “I do not accept the terms in the

license agreement” is chosen, then the installation will be cancelled and GSX

Server will not be installed

It is important to also realize that throughout the installation,

if the Back button is shown and active, it can be selected to turn to the previous screen where a change to a selection may

re-be made If the option is grayed out, it is no longer possible to return to the previous screen

If the EULA is found acceptable, click the radio button to agree to the terms

and then click Next

Th e Setup Type installation page (see Figure 19.3) off ers two choices, each of

which will be explored in detail

Figure 19.2 VMware GSX Server Master Installer EULA Screen.

Figure 19.3 VMware GSX Server Master Installer Set-

up Type Complete Screen.

Trang 33

Complete Installation

Th e fi rst choice is Complete Th e complete choice is exactly what it sounds like,

a complete installation of all components Th erefore, all options are activated

and installed Th e complete installation will set up the following components

on the host server: the server software, the VMware Management Interface, the

VMware Virtual Machine Console, the VmCOM API and the VmPerl API

Th e complete installation is the default installation method and is suffi cient for

most basic installs To choose this installation method, select Complete and then

click Next

If Microsoft IIS is either not installed or is incorrectly confi gured on the host

server, the Master Installer will throw an alert message (see Figure 19.4) IIS must

be installed and properly confi gured on the host server, or the VMware

Manage-ment Interface component will not be installed To install the component, the

installation must be cancelled by clicking the Cancel button, and then IIS must

be installed and properly confi gured on the host server Once complete, the

in-stallation process can be executed again Or to continue the inin-stallation without

the Management Interface, click the OK button Th e Management Interface

can always be installed at a later time by rerunning setup

Th e Destination Folder screen (see Figure 19.5) allows the installation of the

GSX Server components to be installed into a directory other than the default

Figure 19.4 VMware

GSX Server Master

Installer—IIS Missing.

Figure 19.5 VMware GSX

Server Master Installer

Destination Folder Screen.

Trang 34

C:\Program Files\VMware Clicking the Change button allows the default path

to be changed either by manually typing in the new path or by browsing to the

new path using the mouse Unless an installation standard must be followed, it

is highly recommended that the default path not be changed as this option could

aff ect other software programs that assume the default installation directory

Clicking the OK button accepts the installation path and returns to the

previ-ous Destination Folder screen Clicking the Next button brings up the Ready to

Install the VMware GSX Server components screen (see Figure 19.6)

Th is is the last screen of a complete installation before the actual install takes

place To make any fi nal changes, the Back button is available To continue the

installation, click the Install button to begin copying fi les to the host server

If the Master Installer detects that the host server has the CD-ROM autorun

feature enabled, the screen shown in see Figure 19.7 will prompt for input

dur-ing the installation

Figure 19.6 VMware GSX Server Master Installer Ready to Begin Installation Screen.

Disabling Autorun will help prevent undesirable interactions between the host server and the virtual machines If the auto-run feature is left enabled, a CD-ROM intended for a guest operating system may start on the host operating system, or

a CD-ROM may start simultaneously on both the host server and the

virtual machine(s) It is recommended to allow the installer to disable this

feature

Figure 19.7 VMware GSX Server Master Installer Disable CD-ROM Autorun Screen.

Trang 35

Two program shortcuts are then created on the desktop: ware GSX Server Console and the VMware Virtual Machine Console Th e VMware GSX Server Console will launch the virtual machine console for the local host while the VMware Virtual Machine Console will allow a virtual machine console connection

VM-to either the local host server or a remote host server It is important VM-to

note that, starting with GSX Server 3, these two console applications are

identical in functionality unlike previous releases

Assuming there are no errors, the Installation Wizard Completed page will

appear (see Figure 19.8) Th is page simply provides a report as to the success or

failure of the install Th ere is a single button on this page marked Finish Th e

fi nish button concludes the installation As is common with many Windows

applications, after clicking Finish, it is best to reboot the host server to complete

the installation process

Custom Installation

Th e second installation choice is Custom Th e custom installation is

recom-mended for advanced users Custom allows control over most of the basic

fea-tures and functions being installed It can also provide the same installation

options as that of the complete installation by simply making sure that all

op-tions are selected Th e installer can always be run again at a later date to install

any components that were not installed the fi rst time To choose this installation

method, select Custom and then click Next

Th e Custom Setup page allows the manipulation of diff erent component

features to be installed (see Figure 19.10) It is important to note that the

com-ponent options are not mutually exclusive In other words, several diff erent

combinations of these options are available Clicking the arrow to the left of the

component will select and deselect the option for installation

Figure 19.8 VMware GSX

Server Master Installer—

Installation Complete

Screen.

Trang 36

Th e fi rst option is Server Components It has two subfeatures that can be

selected for installation: VMware GSX Server and VMware Management

In-terface Th e VMware GSX Server component provides the core functionality

of GSX Server; and without it, it is not possible to create and confi gure virtual

machines or use the system as a host server platform for virtualization Th is

component must be installed if the server is going to be a virtualization host

server Additionally, the option installs on the host server a local version of the

VMware Virtual Machine Console, which is used to view and control virtual

machines Th is option is not really a necessary component for the host server,

but it is installed by default with the core component Th e tool allows for

key-board, video and mouse (KVM) control of the virtual machines However, this

component can and should be installed by itself on a client machine to remotely

access and control the virtual machines on the host server Doing so is ideal for

both security purposes and to reduce the performance impact of using the tool

directly on the physical host server Th is tool will be discussed in more detail in

chapter 20

Figure 19.9 VMware GSX Server Master Installer Setup Type Custom Screen.

Figure 19.10 VMware GSX Server Master Installer—Custom Feature Description Screen.

Trang 37

Th e VMware Management Interface component provides the mechanism for

an administrator to have a high-level view of the GSX Server host It is a

Web-based tool for managing the host server and the virtual machines that reside on

it Th is tool will also be discussed in more detail in chapter 20 For security

rea-sons, it might make sense in some environments to not install the management

interface or Microsoft IIS Most confi guration setup and management can be

performed remotely by using the VMware Virtual Machine Console

Th e second option is Client Components It has two subfeatures that can be

selected for installation: VMware VmCOM Scripting API and VMware VmPerl

Scripting API Th ese packages install a scripting tool, either COM or Perl, which

can then be used to create scripts to help automate the management of virtual

machines and the host server Th e packages also include sample scripts to help

get started Scripting will be covered in more detail within chapter 25

Th ere are two other options on this page worthy of mention: Space and

Browse Clicking on the Space button will bring up another screen, Disk Space

Requirements

Th e screen (see Figure 19.11) shows the disk space required for the

installa-tion with the selected features, along with the current disk size of each available

drive, its free space available, and the remaining amount of space after

installa-tion It provides information that can help determine the best location to install

the application

Clicking on Browse opens the Change Current Destination Folder screen (see

Figure 19.12) It allows the installation path to be changed to a directory other

than the default of C:\Program Files\VMware Th e screen allows either the new

path to be manually entered by typing the new path or by using the mouse and

navigating via the drop-down window Unless an installation standard must be

followed, it is highly recommended that the default path not be changed as this

option could aff ect other software programs that assume the default installation

Figure 19.11 VMware

GSX Server Master

Installer—Disk Space

Requirements Screen.

Trang 38

directory Clicking the OK button accepts the installation path and returns to the

previous Custom Setup screen Clicking the Next button brings up the Ready to

Install the VMware GSX Server components screen (see Figure 19.13)

Th is is the last screen of a custom installation before the actual install takes

place To make any fi nal changes, the Back button is available To continue the

installation, click the Install button to begin copying fi les to the host server

If the Master Installer detects that the host server has the CD-ROM autorun

feature enabled, the screen shown in Figure 19.14 will prompt for input during

the install

Figure 19.12 VMware GSX Server Master Installer—Change Destination Folder Screen.

Figure 19.13 VMware GSX Server Master Installer Ready to Begin Installation Screen.

Figure 19.14 VMware GSX Server Master Installer Disable CD-ROM Autorun Screen.

Trang 39

Disabling Autorun will prevent undesirable interactions tween the host server and the virtual machines If the autorun feature is left enabled, CD-ROMs intended for a guest oper-ating system may start on the host operating system, or a CD-ROM may start simultaneously on both the host server and the virtual

be-machine It is recommended to allow the installer to disable this feature

Two program shortcuts are then created on the desktop: VMware GSX Server

Console and the VMware Virtual Machine Console Th e VMware GSX Server

Console will launch the virtual machine console for the local host while the

VMware Virtual Machine Console will allow a virtual machine console

con-nection to either the local host server or a remote host server It is important to

note, starting with GSX Server 3, these two console applications are identical in

functionality unlike previous releases

Assuming there are no errors, the Installation Wizard Completed page will

appear (see Figure 19.15) It simply provides a report as to the success or failure

of the install Th ere is a single button on this page marked Finish Th e fi nish

button concludes the installation As is common with many Windows

applica-tions, after clicking Finish, it is best to reboot the host server to complete the

GSX Server for Linux Requirements

Before executing the master installer, there are a few important things to keep

in mind VMware GSX Server and VMware Workstation cannot be installed

on the same host server If Workstation is already installed, it must be removed

from the host server before installation of GSX Server begins Otherwise, the

Workstation application is automatically upgraded to GSX Server Additionally,

multiple versions of GSX Server cannot be installed on the same host server If

Trang 40

a previous version or build of the product already exists on the host server, then

the upgrading GSX Server section in chapter 23 should be followed, otherwise,

the previous installation should be removed before continuing If GSX Server

is allowed to continue the installation with a previous version already installed,

the choices made during the earlier installation become the defaults for the new

installation

In order to install GSX Server, the root account must be logged on Th is

account restriction is only for installation of the product Once installed, the

product can be initiated and run by a user with normal user privileges

Before installing GSX Server, make sure the Linux tion is for a server and not a workstation If it is a workstation distribution, make sure to install the inetd process in order to connect to the VMware Virtual Machine Console and VM-ware Management Interface

distribu-Preparing the Host Server

Preparing the host server is the fi rst in a critical series of steps ensuring that the

system will be stable and provide adequate performance Because a

virtualiza-tion host server will by its very nature be placed under a heavier load than a

normal server, it is important to properly tune the server for the most optimal

performance possible Th ere are many articles on the Internet that speak on the

subject of performance tuning a server However, this section will attempt to

provide a number of steps that may be benefi cial Because all operating systems

and servers are not identical, these options should be tested before using them

in a production environment Assuming the server has had its internal hardware

components installed and the server has been racked:

Ensure the server is properly cabled with the necessary power cables Dual power supplies connected to separate power leads is preferred

Connect any KVM type solution to the host server for remote ment

Connect all Ethernet ports that will be used (unused ports can also be nected if desired)

Upgrade to Gigabit Ethernet if possible

Team multiple network adapters for best performance

Download and install the latest BIOS and then confi gure its settings propriately

Download and upgrade any fi rmware that needs to be updated

Confi gure the RAID controller

1 Confi gure the RAID controller for optimized write operations

Ngày đăng: 08/08/2014, 21:21

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN