Following configuration is for an Intel Xeon E5-2637 and Intel X520 NICs.
The Script will disable VMQ on iSCSI and Livemigration and enable and configure VMQ on converged.
$adapterse = "Slot 3 Port 1","Slot 3 Port 2" #Enable VMQ on NICs with VMs or vNICs
Enable-NetAdapterVmq -Name $adapterse # Enable VMQ
$adaptersd = "Slot 1 Port 1","Slot 1 Port 2","NIC1","NIC2" #Disable VMQ on SAN NICs or Livemigration
Disable-NetAdapterVmq -Name $adaptersd # Disable VMQ
#Set VMQ Settings
Set-NetAdapterVmq -Name "Slot 3 Port 1" -BaseProcessorNumber 2 -MaxProcessors 1 -MaxProcessorNumber 2
Set-NetAdapterVmq -Name "Slot 3 Port 2" -BaseProcessorNumber 6 -MaxProcessors 1 -MaxProcessorNumber 6
Altaro published a great new eBook “Supercharging Hyper-V Performance”.
Here’s what you can expect from this eBook:
- A practical guide to finding and fixing issues in storage, CPU, memory, and network components
- Instructions on how to use Windows Performance Monitor and PAL to monitor your virtualized environment
- Advice on how to plan hosts, VMs, storage, networking and management for maximum performance.
You can download it here.
5nine Software Vice President Symon Perriman published a book with some cool best practices for configuration Windows Server Failover Clusters. 🙂
Greate stuff and great to read.
You can download it here.
as you know sometimes it is neccessary to get some more information about where and when roles within a cluster were successfully moved from one node to another.
One example could be Hyper-V Livemigrations or role movements from mixed role cluster servers.
When you have errors or warnings during rolemigrations, you can see the events directly within the failover cluster manager.
But what is if I want to see successfull role moves? Where do I find them?
Those messages are a bit hidden within the logfile structures of a Windows Server.
- Navigate to Applications and Services Logs\Microsoft\Windows\Failover Clustering\Operational
- There you can find several events dependig if you are on the role sender or receiver
With coming nearer to the release of Windows Server 2016, more and more details about he final server are revealed.
Today I want you give a short list about the switches which will be part of Hyper-V in Windows Server 2016.
||The private switch allows communications among the virtual machines on the host and nothing else. Even the management operating system is not allowed to participate. This switch is purely logical and does not use any physical adapter in any way. “Private” in this sense is not related to private IP addressing. You can mentally think of this as a switch that has no ability to uplink to other switches.
||The internal switch is similar to the private switch with one exception: the management operating system can have a virtual adapter on this type of switch and communicate with any virtual machines that also have virtual adapters on the switch. This switch also does not have any matching to a physical adapter and therefore also cannot uplink to another switch.
||This switch type must be connected to a physical adapter. It allows communications between the physical network and the management operating system and virtual machines. Do not confuse this switch type with public IP addressing schemes or let its name suggest that it needs to be connected to a public-facing connection. You can use the same private IP address range for the adapters on an external virtual switch that you’re using on the physical network it’s attached to.
New Switches available in Windows Server 2016
|Externals Switch with SET
||SET (Switch embedded Teaming) is an alternative NIC Teaming solution that you can use in environments that include Hyper-V and the Software Defined Networking (SDN) stack in Windows Server 2016 Technical Preview. SET integrates some NIC Teaming functionality into the Hyper-V Virtual Switch.SET allows you to group between one and eight physical Ethernet network adapters into one or more software-based virtual network adapters. These virtual network adapters provide fast performance and fault tolerance in the event of a network adapter failure. SET member network adapters must all be installed in the same physical Hyper-V host to be placed in a team.
|NAT Mode Switch
||With the latest releases of the Windows 10 and Windows Server 2016 Technical Preview 4, Microsoft included a new VM Switch Type called NAT, which allows Virtual Machines to have a Internal Network and connect to the external world and internet using NAT.
Virtual Switches in System Center Virtual Machine Manager
||A Standard Switch is basicly a Hyper-V Switch shown in virtual machine manager. From the management and feature perspective there are no differences.
||A Logical Switch includes Virtual Switch Extensions, Uplink Port Profiles which define the physical network adapters used by the Hyper-V Virtual Switch for example for teaming and the Virtual Adapter Port Profiles mapped to Port Classifications which are the settings for the Virtual Network Adapters of the virtual machines.
Not really a switch but part of the Hyper-V networking stack and currently necessary in multi tenant scenarios.
|Multi Tenant Gateway
||In Windows Server 2012 R2, the Remote Access server role includes the Routing and Remote Access Service (RRAS) role service. RRAS is integrated with Hyper-V Network Virtualization, and is able to route network traffic effectively in circumstances where there are many different customers – or tenants – who have isolated virtual networks in the same datacenter.Multi-tenancy is the ability of a cloud infrastructure to support the virtual machine workloads of multiple tenants, but isolate them from each other, while all of the workloads run on the same infrastructure. The multiple workloads of an individual tenant can interconnect and be managed remotely, but these systems do not interconnect with the workloads of other tenants, nor can other tenants remotely manage them.