SlideShare una empresa de Scribd logo
1 de 55
Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site Clustering Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com.  For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC
What Makes a Disaster? ,[object Object]
A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage.  That damage causes the entire processing of that datacenter to cease.
A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.,[object Object]
A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage.  That damage causes the entire processing of that datacenter to cease.
A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.DISASTER! JUST A BAD DAY!
What Makes a Disaster? Your decision to “declare a disaster” and move to “disaster ops” is a major one. The technologies used for disaster protection are different than those used for high-availability. More complex. More expensive.
What Makes a Disaster? Your decision to “declare a disaster” and move to “disaster ops” is a major one. The technologies used for disaster protection are different than those used for high-availability. More complex. More expensive. Failover and failback processes involve more thought. You might not be able to just “fail back” with a click of a button.
A Disastrous Poll Where are We?  Who Here is… Planning a DR Environment? In Process of Implementing One? Already Enjoying One? What’s a “DR Environment” ???
Multi-Site Hyper-V == Single-Site Hyper-V DON’T PANIC:  Multi-site Hyper-V looks very much the same as single-site Hyper-V. Microsoft has not done a good job of explaining this fact! Some Hyper-V hosts. Some networking and storage. Virtual machines that Live Migrate around.
Multi-Site Hyper-V == Single-Site Hyper-V DON’T PANIC:  Multi-site Hyper-V looks very much the same as single-site Hyper-V. Microsoft has not done a good job of explaining this fact! Some Hyper-V hosts. Some networking and storage. Virtual machines that Live Migrate around. But there are some major differences too… VMs can Live Migrate across sites. Sites typically have different subnet arrangements. Data in the primary site must be replaced with the DR site. Clients need to know where your servers go!
Constructing Site-Proof Hyper-V:Three Things You Need At a very high level, Hyper-V disaster recovery is three things: A storage mechanism A replication mechanism A set of target servers and a cluster to receive virtual machines and their data Once you have these three things, layering Hyper-V atop is easy.
Constructing Site-Proof Hyper-V:Three Things You Need Replication Mechanism Storage Device(s) Target Servers
Thing 1:A Storage Mechanism Typically, two SANs in two different locations Fibre Channel , iSCSI, FCoE, heck JBOD. Often similar model or manufacturer.  This similarity can be necessary (although not required) for some replication mechanisms to function property.
Thing 1:A Storage Mechanism Typically, two SANs in two different locations Fibre Channel , iSCSI, FCoE, heck JBOD. Often similar model or manufacturer.  This similarity can be necessary (although not required) for some replication mechanisms to function property. Backup SAN doesn’t necessarily need to be of the same size or speed as the primary SAN Replicated data isn’t always full set of data. You may not need disaster recovery for everything. DR Environments:  Where Old SANs Go To Die.
Thing 2:A Replication Mechanism Replication between SANs must occur. There are two commonly-accepted ways to accomplish this….
Thing 2:A Replication Mechanism Replication between SANs must occur. There are two commonly-accepted ways to accomplish this…. Synchronously Changes are made on one node at a time.   Subsequent changes on primary SAN must wait for ACK from backup SAN. Asynchronously Changes on backup SAN will eventually be written.   Changes queued at primary SAN to be transferred at intervals.
Thing 2:A Replication Mechanism Synchronously Changes are made on one node at a time.  Subsequent changes on primary SAN must wait for ACK from backup SAN.
Thing 2:A Replication Mechanism Asynchronously Changes on backup SAN will eventually be written.  Are queued at primary SAN to be transferred at intervals.
Class Discussion ,[object Object],[object Object]
Synchronous
Assures no loss of data.
Requires a high-bandwidth and low-latency connection.
Write and acknowledgement latencies impact performance.
Requires shorter distances between storage devices.
Asynchronous
Potential for loss of data during a failure.
Leverages smaller-bandwidth connections, more tolerant of latency.
No performance impact.
Potential to stretch across longer distances.
Your Recovery Point Objective makes this decision…,[object Object]
Thing 2½:Replication Processing Location There are also two locations for replication processing… Storage Layer Replication processing is handled by the SAN itself. Agents are often installed to virtual hosts or machines to ensure crash consistency. Easier to set up, fewer moving parts.  More scalable. Concerns about crash consistency. OS / Application Layer Replication processing is handled by software in the VM OS. This software also operates as the agent. More challenging to set up, more moving parts.  More installations to manage/monitor.  Scalability and cost are linear. Fewer concerns about crash consistency.
Thing 3:Target Servers and a Cluster Finally are target servers and a cluster in the backup site.
Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”
Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability.  Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful).
Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability.  Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful). Windows 2008 Eliminated use of SCSI Resets. Eliminated full-solution HCL requirement. Added Cluster Validation Wizard and pre-cluster tests. Clusters can now span subnets (ta-da!)
Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability.  Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful). Windows 2008 Eliminated use of SCSI Resets. Eliminated full-solution HCL requirement. Added Cluster Validation Wizard and pre-cluster tests. Clusters can now span subnets (ta-da!) Windows 2008 R2 Improvements to Cluster Validation Wizard and Migration Wizard. Additional cluster services. Cluster Shared Volumes (!) and Live Migration (!)
So, What IS a Cluster?
So, What IS a Cluster? Quorum Drive & Storage for Hyper-V VMs
So, What IS a Multi-Site Cluster?
Quorum:  Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…?
Quorum:  Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…? A cluster “exists” because it has quorum between its members.  That quorum is achieved through a voting process. Different Kiwanis clubs have different rules for quorum. Different clusters have different rules for quorum.
Quorum:  Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…? A cluster “exists” because it has quorum between its members.  That quorum is achieved through a voting process. Different Kiwanis clubs have different rules for quorum. Different clusters have different rules for quorum. If a cluster “loses quorum”, the entire cluster shuts down and ceases to exist.  This happens until quorum is regained. This is much different than a resource failover, which is the reason why clusters are implemented. Multiple quorum models exist.
Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority:  Disk Only
Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority:  Disk Only
Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority:  Disk Only
Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority:  Disk Only
Quorum in Multi-Site Clusters Node and Disk Majority Node Majority Node and File Share Majority No Majority:  Disk Only Microsoft recommends using the Node and File Share Majority model for multi-site clusters. This model provides the best protection for a full-site outage. Full-site outage requires a file share witness in a third geographic location.

Más contenido relacionado

La actualidad más candente

Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesJoep Piscaer
 
Virtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandVirtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandYan Pritzker
 
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski buildacloud
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting AlexTian
 
Orchestration for the rest of us
Orchestration for the rest of usOrchestration for the rest of us
Orchestration for the rest of usJérôme Petazzoni
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackRadhika Puthiyetath
 
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per SecondAmazon Web Services
 
SQL Server Clustering for Dummies
SQL Server Clustering for DummiesSQL Server Clustering for Dummies
SQL Server Clustering for DummiesMark Broadbent
 
Compare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL ServerCompare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL ServerAlexDepo
 
NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookpamolson
 
Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloudahmedmehiny
 
Why resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudesWhy resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudesUwe Friedrichsen
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloudsankarimsc
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationrjain51
 
Vs host clustering
Vs host clusteringVs host clustering
Vs host clusteringrickythekid
 
JavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jcloudsJavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jcloudszshoylev
 
CloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCatCloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCatAndrew Bayer
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Sheng Yang
 

La actualidad más candente (20)

Veeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practicesVeeam webinar - Deduplication best practices
Veeam webinar - Deduplication best practices
 
Virtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On DemandVirtualization and Cloud Computing with Elastic Server On Demand
Virtualization and Cloud Computing with Elastic Server On Demand
 
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
Troubleshooting Strategies for CloudStack Installations by Kirk Kosinski
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting
 
Orchestration for the rest of us
Orchestration for the rest of usOrchestration for the rest of us
Orchestration for the rest of us
 
NetApp against ransomware
NetApp against ransomwareNetApp against ransomware
NetApp against ransomware
 
ESX performance problems 10 steps
ESX performance problems 10 stepsESX performance problems 10 steps
ESX performance problems 10 steps
 
Troubleshooting Apache Cloudstack
Troubleshooting Apache CloudstackTroubleshooting Apache Cloudstack
Troubleshooting Apache Cloudstack
 
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
(BDT323) Amazon EBS & Cassandra: 1 Million Writes Per Second
 
SQL Server Clustering for Dummies
SQL Server Clustering for DummiesSQL Server Clustering for Dummies
SQL Server Clustering for Dummies
 
Compare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL ServerCompare Clustering Methods for MS SQL Server
Compare Clustering Methods for MS SQL Server
 
NetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebookNetIQ Disaster Recovery ebook
NetIQ Disaster Recovery ebook
 
Virtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private CloudVirtualization Technology, Cloud Computing & Building a Private Cloud
Virtualization Technology, Cloud Computing & Building a Private Cloud
 
Why resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudesWhy resilience - A primer at varying flight altitudes
Why resilience - A primer at varying flight altitudes
 
virtualization and cloud
virtualization and cloudvirtualization and cloud
virtualization and cloud
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Vs host clustering
Vs host clusteringVs host clustering
Vs host clustering
 
JavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jcloudsJavaOne 2014: Taming the Cloud Database with jclouds
JavaOne 2014: Taming the Cloud Database with jclouds
 
CloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCatCloudStack, jclouds, Jenkins and CloudCat
CloudStack, jclouds, Jenkins and CloudCat
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4
 

Destacado

VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and UsesConcentrated Technology
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateDon Reese
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secretChris Conte
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionRob Dunn
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administrationConcentrated Technology
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellConcentrated Technology
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationConcentrated Technology
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functionsmikepfeiffer
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershellSalaudeen Rajack
 

Destacado (20)

Meet Windows PowerShell
Meet Windows PowerShellMeet Windows PowerShell
Meet Windows PowerShell
 
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and UsesVDI-in-a-Box:  Microsoft Desktop Virtualization for Smaller Businesses and Uses
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and Uses
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
 
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - CertificateAdvanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
Advanced Tools & Scripting with PowerShell 3.0 Jump Start - Certificate
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
 
Combining output from multiple sources
Combining output from multiple sourcesCombining output from multiple sources
Combining output from multiple sources
 
Ive got a powershell secret
Ive got a powershell secretIve got a powershell secret
Ive got a powershell secret
 
Basic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 sessionBasic PowerShell Toolmaking - Spiceworld 2016 session
Basic PowerShell Toolmaking - Spiceworld 2016 session
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
 
Free tools for win server administration
Free tools for win server administrationFree tools for win server administration
Free tools for win server administration
 
Automating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShellAutomating Active Directory mgmt in PowerShell
Automating Active Directory mgmt in PowerShell
 
PowerShell and the Future of Windows Automation
PowerShell and the Future of Windows AutomationPowerShell and the Future of Windows Automation
PowerShell and the Future of Windows Automation
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
 
PowerShell Functions
PowerShell FunctionsPowerShell Functions
PowerShell Functions
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
 
Automating ad with powershell
Automating ad with powershellAutomating ad with powershell
Automating ad with powershell
 
Ad disasters & how to prevent them
Ad disasters & how to prevent themAd disasters & how to prevent them
Ad disasters & how to prevent them
 
Introduction to powershell
Introduction to powershellIntroduction to powershell
Introduction to powershell
 

Similar a Implement Affordable Disaster Recovery with Hyper-V and Multi-Site Clustering

DataCore Solutions Overview
DataCore Solutions OverviewDataCore Solutions Overview
DataCore Solutions OverviewJames Price
 
Top Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesTop Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesAidan Finn
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)Casey Bisson
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18Casey Bisson
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingShapeBlue
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Concentrated Technology
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And ScalabilityJason Ragsdale
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization1CloudRoad.com
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High AvailabitiyEduardo Castro
 
South jersey sql virtualization
South jersey sql virtualizationSouth jersey sql virtualization
South jersey sql virtualizationJoseph D'Antoni
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentationshabi_hassan
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalStephen Rose
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 

Similar a Implement Affordable Disaster Recovery with Hyper-V and Multi-Site Clustering (20)

Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
 
DataCore Solutions Overview
DataCore Solutions OverviewDataCore Solutions Overview
DataCore Solutions Overview
 
Top Hyper-V Implementation Issues
Top Hyper-V Implementation IssuesTop Hyper-V Implementation Issues
Top Hyper-V Implementation Issues
 
The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)The Lies We Tell Our Code (#seascale 2015 04-22)
The Lies We Tell Our Code (#seascale 2015 04-22)
 
Designing virtual infrastructure
Designing virtual infrastructureDesigning virtual infrastructure
Designing virtual infrastructure
 
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
The lies we tell our code, LinuxCon/CloudOpen 2015-08-18
 
CloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and TroubleshootingCloudStack - Top 5 Technical Issues and Troubleshooting
CloudStack - Top 5 Technical Issues and Troubleshooting
 
Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0Virtualization auditing & security deck v1.0
Virtualization auditing & security deck v1.0
 
Web Speed And Scalability
Web Speed And ScalabilityWeb Speed And Scalability
Web Speed And Scalability
 
A Xen Case Study
A Xen Case StudyA Xen Case Study
A Xen Case Study
 
Vizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through VirtualizationVizioncore Economical Disaster Recovery through Virtualization
Vizioncore Economical Disaster Recovery through Virtualization
 
Web Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQWeb Werks Cloud Hosting FAQ
Web Werks Cloud Hosting FAQ
 
Hyper V High Availabitiy
Hyper V High AvailabitiyHyper V High Availabitiy
Hyper V High Availabitiy
 
South jersey sql virtualization
South jersey sql virtualizationSouth jersey sql virtualization
South jersey sql virtualization
 
Sql saturday dc vm ware
Sql saturday dc vm wareSql saturday dc vm ware
Sql saturday dc vm ware
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Double-Take Software
Double-Take SoftwareDouble-Take Software
Double-Take Software
 
Server Virtualization Seminar Presentation
Server Virtualization Seminar PresentationServer Virtualization Seminar Presentation
Server Virtualization Seminar Presentation
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 

Más de Concentrated Technology

Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsConcentrated Technology
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsConcentrated Technology
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAConcentrated Technology
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingConcentrated Technology
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShellConcentrated Technology
 

Más de Concentrated Technology (20)

Wsus sample scripts
Wsus sample scriptsWsus sample scripts
Wsus sample scripts
 
Wsus best practices
Wsus best practicesWsus best practices
Wsus best practices
 
Virtualization today
Virtualization todayVirtualization today
Virtualization today
 
Vdi in-a-box
Vdi in-a-boxVdi in-a-box
Vdi in-a-box
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
 
Top ESXi command line v2.0
Top ESXi command line v2.0Top ESXi command line v2.0
Top ESXi command line v2.0
 
Supporting SQLserver
Supporting SQLserverSupporting SQLserver
Supporting SQLserver
 
Server Core2
Server Core2Server Core2
Server Core2
 
Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
 
Rapidly deploying software
Rapidly deploying softwareRapidly deploying software
Rapidly deploying software
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
 
PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
 
Iis implementation
Iis implementationIis implementation
Iis implementation
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

Implement Affordable Disaster Recovery with Hyper-V and Multi-Site Clustering

  • 1. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site Clustering Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 2. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC
  • 3.
  • 4. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
  • 5. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
  • 6. A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
  • 7. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
  • 8.
  • 9. A naturally-occurring event, such as a tornado, flood, or hurricane, impacts your datacenter and causes damage. That damage causes the entire processing of that datacenter to cease.
  • 10. A widespread incident, such as a water leakage or long-term power outage, that interrupts the functionality of your datacenter for an extended period of time.
  • 11. A problem with a virtual host creates a “blue screen of death”, immediately ceasing all processing on that server.
  • 12. An administrator installs a piece of code that causes problems with a service, shutting down that service and preventing some action from occurring on the server.
  • 13. An issue with power connections causes a server or an entire rack of servers to inadvertently and rapidly power down.DISASTER! JUST A BAD DAY!
  • 14. What Makes a Disaster? Your decision to “declare a disaster” and move to “disaster ops” is a major one. The technologies used for disaster protection are different than those used for high-availability. More complex. More expensive.
  • 15. What Makes a Disaster? Your decision to “declare a disaster” and move to “disaster ops” is a major one. The technologies used for disaster protection are different than those used for high-availability. More complex. More expensive. Failover and failback processes involve more thought. You might not be able to just “fail back” with a click of a button.
  • 16. A Disastrous Poll Where are We? Who Here is… Planning a DR Environment? In Process of Implementing One? Already Enjoying One? What’s a “DR Environment” ???
  • 17. Multi-Site Hyper-V == Single-Site Hyper-V DON’T PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V. Microsoft has not done a good job of explaining this fact! Some Hyper-V hosts. Some networking and storage. Virtual machines that Live Migrate around.
  • 18. Multi-Site Hyper-V == Single-Site Hyper-V DON’T PANIC: Multi-site Hyper-V looks very much the same as single-site Hyper-V. Microsoft has not done a good job of explaining this fact! Some Hyper-V hosts. Some networking and storage. Virtual machines that Live Migrate around. But there are some major differences too… VMs can Live Migrate across sites. Sites typically have different subnet arrangements. Data in the primary site must be replaced with the DR site. Clients need to know where your servers go!
  • 19. Constructing Site-Proof Hyper-V:Three Things You Need At a very high level, Hyper-V disaster recovery is three things: A storage mechanism A replication mechanism A set of target servers and a cluster to receive virtual machines and their data Once you have these three things, layering Hyper-V atop is easy.
  • 20. Constructing Site-Proof Hyper-V:Three Things You Need Replication Mechanism Storage Device(s) Target Servers
  • 21. Thing 1:A Storage Mechanism Typically, two SANs in two different locations Fibre Channel , iSCSI, FCoE, heck JBOD. Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property.
  • 22. Thing 1:A Storage Mechanism Typically, two SANs in two different locations Fibre Channel , iSCSI, FCoE, heck JBOD. Often similar model or manufacturer. This similarity can be necessary (although not required) for some replication mechanisms to function property. Backup SAN doesn’t necessarily need to be of the same size or speed as the primary SAN Replicated data isn’t always full set of data. You may not need disaster recovery for everything. DR Environments: Where Old SANs Go To Die.
  • 23. Thing 2:A Replication Mechanism Replication between SANs must occur. There are two commonly-accepted ways to accomplish this….
  • 24. Thing 2:A Replication Mechanism Replication between SANs must occur. There are two commonly-accepted ways to accomplish this…. Synchronously Changes are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN. Asynchronously Changes on backup SAN will eventually be written. Changes queued at primary SAN to be transferred at intervals.
  • 25. Thing 2:A Replication Mechanism Synchronously Changes are made on one node at a time. Subsequent changes on primary SAN must wait for ACK from backup SAN.
  • 26. Thing 2:A Replication Mechanism Asynchronously Changes on backup SAN will eventually be written. Are queued at primary SAN to be transferred at intervals.
  • 27.
  • 29. Assures no loss of data.
  • 30. Requires a high-bandwidth and low-latency connection.
  • 31. Write and acknowledgement latencies impact performance.
  • 32. Requires shorter distances between storage devices.
  • 34. Potential for loss of data during a failure.
  • 35. Leverages smaller-bandwidth connections, more tolerant of latency.
  • 37. Potential to stretch across longer distances.
  • 38.
  • 39. Thing 2½:Replication Processing Location There are also two locations for replication processing… Storage Layer Replication processing is handled by the SAN itself. Agents are often installed to virtual hosts or machines to ensure crash consistency. Easier to set up, fewer moving parts. More scalable. Concerns about crash consistency. OS / Application Layer Replication processing is handled by software in the VM OS. This software also operates as the agent. More challenging to set up, more moving parts. More installations to manage/monitor. Scalability and cost are linear. Fewer concerns about crash consistency.
  • 40. Thing 3:Target Servers and a Cluster Finally are target servers and a cluster in the backup site.
  • 41. Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.”
  • 42. Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability. Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful).
  • 43. Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability. Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful). Windows 2008 Eliminated use of SCSI Resets. Eliminated full-solution HCL requirement. Added Cluster Validation Wizard and pre-cluster tests. Clusters can now span subnets (ta-da!)
  • 44. Clustering’s Sordid History Windows NT 4.0 Microsoft Cluster Service “Wolfpack”. “As the corporate expert in Windows clustering, I recommend you don’t use Windows clustering.” Windows 2000 Greater availability, scalability. Still painful. Windows 2003 Added iSCSI storage to traditional Fibre Channel. SCSI Resets still used as method of last resort (painful). Windows 2008 Eliminated use of SCSI Resets. Eliminated full-solution HCL requirement. Added Cluster Validation Wizard and pre-cluster tests. Clusters can now span subnets (ta-da!) Windows 2008 R2 Improvements to Cluster Validation Wizard and Migration Wizard. Additional cluster services. Cluster Shared Volumes (!) and Live Migration (!)
  • 45. So, What IS a Cluster?
  • 46. So, What IS a Cluster? Quorum Drive & Storage for Hyper-V VMs
  • 47. So, What IS a Multi-Site Cluster?
  • 48. Quorum: Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…?
  • 49. Quorum: Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…? A cluster “exists” because it has quorum between its members. That quorum is achieved through a voting process. Different Kiwanis clubs have different rules for quorum. Different clusters have different rules for quorum.
  • 50. Quorum: Windows Clustering’s Most Confusing Configuration Ever been to a Kiwanis meeting…? A cluster “exists” because it has quorum between its members. That quorum is achieved through a voting process. Different Kiwanis clubs have different rules for quorum. Different clusters have different rules for quorum. If a cluster “loses quorum”, the entire cluster shuts down and ceases to exist. This happens until quorum is regained. This is much different than a resource failover, which is the reason why clusters are implemented. Multiple quorum models exist.
  • 51. Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority: Disk Only
  • 52. Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority: Disk Only
  • 53. Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority: Disk Only
  • 54. Four Options for Quorum Node and Disk Majority Node Majority Node and File Share Majority No Majority: Disk Only
  • 55. Quorum in Multi-Site Clusters Node and Disk Majority Node Majority Node and File Share Majority No Majority: Disk Only Microsoft recommends using the Node and File Share Majority model for multi-site clusters. This model provides the best protection for a full-site outage. Full-site outage requires a file share witness in a third geographic location.
  • 56. Quorum in Multi-Site Clusters Use the Node and File Share Quorum Prevents entire-site outage from impacting quorum. Enables creation of multiple clusters if necessary. Third Site for Witness Server
  • 57. I Need a Third Site? Seriously? Here’s where Microsoft’s ridiculous quorum notion gets unnecessarily complicated… What happens if you put the quorum’s file share in the primary site? The secondary site might not automatically come online after a primary site failure. Votes in secondary site < Votes in primary site Let’s count on our fingers…
  • 58. I Need a Third Site? Seriously? Here’s where Microsoft’s ridiculous quorum notion gets unnecessarily complicated… What happens if you put the quorum’s file share in the secondary site? A failure in the secondary site could cause the primary site to go down. Votes in secondary site > votes in primary site. More fingers… This problem gets even weirder as time passes and the number of servers changes in each site.
  • 59. I Need a Third Site? Seriously? Third Site for Witness Server
  • 61. Multi-Site Cluster Tips/Tricks Install servers to sites so that your primary site always contains more servers than backup sites. Eliminates some problems with quorum during site outage.
  • 62. Multi-Site Cluster Tips/Tricks Manage Preferred Owners & Persistent Mode options. Make sure your servers fail over to servers in the same site first. But also make sure they have options on failing over elsewhere.
  • 64. Multi-Site Cluster Tips/Tricks Manage Preferred Owners & Persistent Mode options. Make sure your servers fail over to servers in the same site first. But also make sure they have options on failing over elsewhere. Consider carefully the effects of Failback. Failback is a great solution for resetting after a failure. But Failback can be a massive problem-causer as well. Its effects are particularly pronounced in Multi-Site Clusters. Recommendation: Turn it off, (until you’re ready).
  • 66. Multi-Site Cluster Tips/Tricks Resist creating clusters that support other services. A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster.
  • 67. Multi-Site Cluster Tips/Tricks Resist creating clusters that support other services. A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster. Use disk “dependencies” as Affinity/Anti-Affinity rules. Hyper-V all by itself doesn’t have an elegant way to affinitize. Setting disk dependencies against each other is a work-around.
  • 68. Multi-Site Cluster Tips/Tricks Resist creating clusters that support other services. A Hyper-V cluster is a Hyper-V cluster is a Hyper-V cluster. Use disk “dependencies” as Affinity/Anti-Affinity rules. Hyper-V all by itself doesn’t have an elegant way to affinitize. Setting disk dependencies against each other is a work-around. Add Servers in Pairs Ensures that a server loss won’t cause site split brain. This is less a problem with the File Share Witness configuration.
  • 69. Multi-Site Cluster Tips/Tricks Segregate traffic!!!
  • 70. Most Important! Ensure that networking remains available when VMs migrate from primary to backup site.
  • 71. Most Important! Ensure that networking remains available when VMs migrate from primary to backup site. Clustering can span subnets!This is good, but only if you plan for it… Remember that crossing subnets also means changing IP address, subnet mask, gateway, etc, at new site. This can be automatically done by using DHCP and dynamic DNS, or must be manually updated. DNS replication is also a problem. Clients will require time to update their local cache. Consider reducing DNS TTL or clearing client cache.
  • 72. Implementing Affordable Disaster Recovery with Hyper-V andMulti-Site Clustering Greg Shields, MVPPartner and Principal Technologistwww.ConcentratedTech.com
  • 73. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like. For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgreg This work is copyright ©Concentrated Technology, LLC