ITProGuru Chief Technology Strategist US DX North East Audience dstoltsMicrosoftcom Blog ITProGurucom Virtualization amp Datacenter Operations and Management of the future Abstract ID: 474227
Download Presentation The PPT/PDF document "Dan Stolts" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Dan Stolts
(@ITProGuru)Chief Technology StrategistUS DX North East – Audiencedstolts@Microsoft.comBlog: ITProGuru.com
Virtualization & Datacenter Operations and Management of the futureSlide2
Abstract
Virtualization & Datacenter Operations and Management of the futureTechnology is changing at a breathtaking pace! Major security landscape changes, Client and Server OS changes, Hybrid and Cloud technology changes and much more. All of this puts an increased burden on IT. Our need to translate business problems into technology solutions put an even greater stress on IT. We are forced to keep up with the changes in business and technology. What are some of these changes and how should we respond to them? In this session, we will demystify the future of IT and datacenter operations. Windows Server 2016 and the cloud will play an increasing role in helping us meet the challenges of our new IT landscape. Come to this session to have a look at the near future as well as the soon to be released tools to help us meet these challenges. On this journey, we will also get a sneak peek of the next version of Windows Server… Windows Server 2016.Slide3
2016 CIO Priorities & Challenges
Talent has now been recognized globally as the single biggest issue standing in the way of CIOs achieving their objectives.The biggest talent gaps are around information — big data, analytics, and informationmanagement — followed by business knowledge/acumen. http://www.gartner.com/imagesrv/cio/pdf/cio_agenda_insights_2016.pdfSlide4
Short Story…Protecting Elephants and other endangered …Slide5
CHALLENGE
Fujitsu is the world’s fourth-largest IT services provider with approximately
162,000
employees in more than
100
countries and holds about
97,000
patents worldwide. Fujitsu wanted to help dairy farmers
increase production
, improve
data insights
and
transform
their
business
by optimizing the timing of artificial insemination (AI). It also wanted to decrease loss through early detection of health issues.
Improves calf production up to 31%, with an average of 12%Modernizes data access with mobile phone alerts, reducing labor costs for monitoring cowsTransforms herd management by allowing farmers to increase chances of producing a male or female calfReduces loss by detecting 8-10 different kinds of diseases in cattle
BENEFITS
SOLUTION
Fujitsu learned from public research that a cow produces more estrus (goes into heat) 16 hours after the number of steps increases significantly. The company created an
innovative solution which uses a rugged pedometer with a five-year battery to measure the number of footsteps a cow takes, then sends that data to the cloud for analysis to determine optimum AI timing and even affect calf gender. In addition, the patterns of steps can detect disease in cattle. Alerts are delivered to the farmer’s cell phone.
FUJITSU
The connected cow: Using IoT to transform cattle productionSlide6
The Talent Problem
Get Smart on the business!
Get Smart on Technology!Slide7
Who is best suited to do the mapping between Business Problem and Technology Solution?
CEO / CFO / CXOCIO / Director of ITManagers / Business Unit LeadersIT Managers / System Designers / Architects / Engineers
Where do YOU
fit?Who understands
how
Technology
can be used to Solve Business Problems?Slide8
Translating Business Problem to Technology Solution Often Really HARD!!!
Business ProblemAKA: Functional RequirementsAddresses a business need or opportunityLanguage: Business (vision, strategic mission, objectives, processes)Often many problems are manifests so root problem often difficult to identifyPeople who understand the business typically not smart about technologyPerspective: Business climate, emerging industry issues, culture, business aimWhat are the usability implicationsTechnology SolutionAKA: Technical RequirementsAddresses a technology challengeLanguage: Technology (Programming, Infrastructure, Cloud, IoT)Often many solutions are required to solve one business problem Solve for y = ((x + 2) * (x + 7) )/ 127 People who understand technology often do not understand business challengesPerspective: Technology Available, technical skills, technical resourcesWhat are the Security ImplicationsTwo trains leave different cities heading toward each other at different speeds. When and where do they meet?Train A, traveling 70 miles per hour (mph), leaves Westford heading toward Eastford
, 260 miles away.
At the same time Train B, traveling 60 mph, leaves
Eastford
heading toward Westford.
When do the two trains meet?
How far from each city do they meet?
http://mathforum.org/dr.math/faq/faq.two.trains.htmlSlide9
Architect Defined
Noun: 1. a person who designs and in many cases also supervises construction2. the deviser, maker, or creator of anything: the architects of the Constitution of the United States.Verb:4. to plan, organize, or structure as an architect: The house is well architected.Take Challenge <=> Create SolutionSlide10
But…Your Help Is Needed!!!!
At the speed at which technology changes, it is impossible for a person CIO or even a small number of people (Architects) to Solve All Business Needs. Slide11
Provide Business Units The Service(s) and Solutions They NeedOr…
Your Business Unit Will…Lose MoneyNot Hit Their NumbersGo Around You!Find a SolutionHost it in the cloudStray from policy and proceduresYou WILL …Miss OpportunityLose ControlLose VisibilityLose ManagementStill be RESPONSIBLE if the $%^&* hits the fan!!!Lose your SANITY? Your JOB?AKA: Shadow ITSlide12
Translate Business Objectives Into Actions
Identify Problems (especially root problems)Determine the requirements to solve each problemDetermine technology available to help solve the problemIdentify strategic partnersDetermine likely barriersDetermine additional value (if any)Get StartedSlide13
Complicating The Situation…
Business Units are accustomed to …IT coming up with objectionsIT not understanding needsIT Not delivering in a timely fashionIT as a barrier to progress….Why?Poorly formulated planDoes not follow proceduresNot enough time Don’t have the right skills….We Need to get their confidence backGet them to engage you early then OVER DELIVER for a few years!Slide14
Considerations / NEED TO KNOW!
Vision or Strategic MissionBenefit to the business and companyLongevity of solutionUser ImpactSystems & Business Impact (pro’s and con’s)How it is RELATED to other business challengesHow it is RELATED to other technology solutionsIdentify stakeholders – All may not be obviousSecurity ImplicationsBudget????Slide15
Driving Business ImpactDon’t wait for a business challenge to land in your lap.. Go FIND IT!Slide16
What’s Possible?Business Impact &
Career ImpactSlide17
What’s Possible?Microsoft Want’s to help you create what is possible for your company!
Solve Current problemsCreate New RevenueGenerate New Customer Base…New Opportunities that nobody has thought of?The people in this room, CAN and SHOULD Make A Difference byArchitecting What’s PossibleSlide18
Identifying What is Possible?Ask Yourself or Business Unit Leader…
What challenges are you facing?How are we falling behind the competition?How can you deliver services faster?How can you help the company continue expansion?How can you increase customer satisfaction or retention? What are current pain points for…Customers? Partners? Employees?What new services (cloud, mobile) might your business benefit from?Projects on a shelf for lack of infrastructure or money?Vision + New Cloud Solution = Success!@ITProGuruSlide19
Brainstorming / Team Workshop (60 min)Or… ¼ or ½ day workshops
HintsCollaborationCloudMobileIoTDatacenterMerger/AcquisitionSave MoneyIncrease RevenueBusiness Unit OppEmployeeCustomerPartnerSupplierCollaborate!Slide20
Dedicate Time Each Week
Understanding the BusinessKeeping up with Technology5%10%15%MorePersonal TimeSlide21
EVOLUTION OF DATACENTER
EFFICIENCY
CLOUD-FIRST
APPLICATIONS AND SERVICES
INFRASTRUCTURE
How much remains un-virtualized?
Why is the business using shadow IT?
Why is my CIO looking at agile alternatives?
Why is investment in apps growing so much faster than IT?
We want you to be at the center of application innovationSlide22
Introduced
virtualization platform/ managementIndustry-leading scale and performance
Azure as
design point
Cloud-first
innovation:
Infrastructure
and application
platform
Windows Server 2008
System Center 2008
Windows Server 2012
System Center 2012
Windows Server 2012 R2
System Center 2012 R2
Microsoft Azure
Windows Server 2016System Center 2016
Microsoft Azure
Looking aheadSlide23
Opportunity to rethink your datacenter: Think services, not servers
Traditional datacenter
Tight coupling between infrastructure and apps
Expensive, vertically integrated hardware
Silo-
ed
infrastructure and operations
Highly customized processes and configurations
Microsoft Azure datacenter
Loosely coupled apps and micro-services
Industry-standard hardware
Service-focused DevOps
Standardized processes and configurationsSlide24
Platform Services
Security & ManagementInfrastructure ServicesCompute
Storage
Datacenter Infrastructure (24 Regions, 19 Online)
Web and Mobile
Web Apps
Mobile
Apps
API
Management
API
Apps
Logic
Apps
Notification
Hubs
Media & CDN
Content Delivery
Network (CDN)
Media
ServicesAnalytics & IoT
HDInsightMachineLearning
Stream
Analytics
Data
Factory
Event
Hubs
Mobile
Engagement
Active
Directory
Multi-Factor
Authentication
Automation
Portal
Key Vault
Integration
Biztalk
Services
Hybrid
Connections
Service
Bus
Storage
Queues
Store /
Marketplace
Hybrid
Operations
Backup
StorSimple
Site
Recovery
Import/Export
Networking
Data
SQL
Database
DocumentDB
Redis
Cache
Search
Tables
SQL Data
Warehouse
Azure AD
Connect Health
Virtual Network
Express
Route
BLOB Storage
Azure Files
Premium Storage
Virtual Machines
AD Privileged
Identity
Management
Traffic Manager
Application Gateway
Operational
Insights
Compute
Cloud
Services
Batch
Remote App
Service
Fabric
Developer Services
Visual Studio
Application
Insights
Azure SDK
Team Project
Containers
VM Image Gallery
& VM Depot
DNS
VPN Gateway
Load BalancerSlide25
Example: Azure Certification Jump Start
70-534 Architecting Microsoft Azure Solutions8:00 Registration, Breakfast and Networking8:30 Sharp: 70-534 IntroductionExam Tips and TricksDesign Microsoft Azure infrastructure and networking (15–20%)Secure resources (15–20%)Design an advanced application (15–20%)Lunch & Labs Design websites (15–20%)Design an application storage and data access strategy (15–20%)Design a management, monitoring, and business continuity strategy (15–20%)Field Experiences5:00pm Book Signing – Authors Dan Stolts5:00pm Social Hour w/ Dan Stolts and FriendsRegistration Required
ITProGuru.com/Join
All Attendees Go Home With The Book & Autograph!!!
Brought to you By:
@ITProGuru
Microsoft
http://www.amazon.com/dp/0735697442/ref=rdr_ext_tmbSlide26
Microsoft Azure Infrastructure
24
Regions ONLINE…huge datacenter capacity around the world…and we’re growing
100+ datacenters
One of the top 3 networks in the world (coverage, speed, connections)
2 x AWS and 6x Google number of offered regions
G Series – Largest VM available in the market – 32 cores, 448GB Ram, SSD…
Operational
Announced
Central US
Iowa
West US
California
North Europe
Ireland
East US
Virginia
East US 2
Virginia
US
Gov
Virginia
North Central US
Illinois
US
Gov
Iowa
South Central US
Texas
Brazil South
Sao Paulo
West Europe
Netherlands
China North *
Beijing
China South *
Shanghai
Japan East
Saitama
Japan West
Osaka
India West
TBD
India East
TBD
East Asia
Hong Kong
SE Asia
Singapore
Australia West
Melbourne
Australia East
Sydney
* Operated by 21VianetSlide27
VMware Comparison
SystemResourceWindows Server 2012 R2 Hyper-VvSphereHypervisorvSphere 5.1 Enterprise PlusvSphere 5.5 Enterprise PlusHost
Logical Processors
320
320
160
320
Physical
Memory
4TB
4TB
2TB
4TB
Virtual CPUs per Host
2,048
4,0962,048
4,096VMVirtual CPUs per VM648641641Memory per VM1TB1TB1TB1TBActive VMs per Host1,024512
512
512Guest NUMAYesYesYesYesCluster
Maximum Nodes64N/A2N/A32Maximum VMs8,000
N/A2N/A4,000Want more a more detailed technical comparison? Visit http://aka.ms/CompareTovSphere Slide28
SCALE
64 vCPU per VM1TB RAM per VM4TB RAM per host320 LP per host64 TB VHDX1024 VMs per hostvNUMA
AGILITY
Dynamic memoryLive migration
LM with compression
LM over SMB direct
Storage LM
Shared nothing LM
Cross-version LM
Hot add/resize VHDX
Storage
QoS
Live VM export
AVAILABILITY
Host clustering
64 node clusters
Guest clusteringShared VHDXHyper-V replicaNETWORKINGIntegrated network virtualNetwork virtual gatewayExtended port ACLsvRSSDynamic teamingHETEROGENEOUSLinuxFreeBSD
AND MORE…
Gen 2 VMsEnhanced sessionAuto VM activationThe Windows Server story so far…
Built in.Slide29
Security and isolationSlide30
Emerging security threats
Rising number of organizations suffering from breaches
Cybercrime costs US economy up to $140 billion annually, report says
Los Angeles Times [2014]
How hackers allegedly stole “unlimited” amounts of cash
from banks in just
a few hours
Ars
Technica
[2014]
The biggest
cyberthreat
to companies
could come
from the inside
Cnet
[2015]
Cyberattacks on
the rise against US corporationsNew York Times [2014]
Espionage malware infects
rafts of governments,
industries around the world
Ars
Technica
[2014]
Forget carjacking, soon it will be
carhacking
The Sydney Morning
Herald [2014]
Malware burrows deep into computer BIOS to escape AV
The Register
[September 2014]
Bigger
motivations
2
Increasing
incidents
1
Bigger
risk
3
1
1
2
2
3
3
3
Need more or more recent samples… http://www.privacyrights.org/data-breach/newSlide31
We know that administrators have the keys to the kingdom; we gave them those keys decades ago
But those administrators privileges are being compromised through social engineering, bribery, coercion, private initiatives … each of these attacks seeks out & exploits privileged accounts.Central risk: Administrator privileges
Stolen admin
credentials
Insider
attacks
Phishing
attacksSlide32
Conclusion: change the way we think about security
We have to “assume breach” – not a position of pessimism, one of security rigorProblemA breach will (already did?) happen
Lacking the security-analysis manpowerCan’t determine the impact of the breach
Unable to adequately respond to the breach
New approach
(in addition to ‘prevention’)
Limit or block the breach from spreading
Detect the breach
Respond to the breachSlide33
Virtual machine
OS
Data
Workload
Compute
Storage
Network
Hypervisor
Fabric
Host Guardian Service
Enabler to run Shielded
Virtual
Machines on
a legitimate host in the fabric
Shielded VM
Bitlocker enabled VM
Virtual Secure Mode
Process and Memory access protection from the host
Any seized or infected host administrators can access
guest virtual machines
Impossible to identify
legitimate hosts without a hardware based verification
Tenants VMs are exposed to storage and network attacks while unencrypted
Protect virtual machines
Microsoft’s approach
Hardware-rooted technologies
to separate the guest operating system from host administrators
Guarded fabric to identify legitimate hosts and certify them to run shielded tenant VMs
Virtualized trusted platform module (
vTPM
) support to encrypt virtual machines
Host Guardian Service
Fabric
Hypervisor
Customer
Hypervisor
Fabric
Storage
Host OS
Customer
Guest VM
Trust
the host
Guest VMSlide34
A privileged fabric
1
Hyper-V hosts
Virtual machines
Spread of virtualization has led to unexpected security implications
2
3
4
Tenant
virtual
machines
Fabric/virtualization administrators
Have the highest privileges, instead of the traditional model where domain administrators are the most trusted IT staff
1
2
Virtualized domain controllers
If DCs are virtualized and I’m a Hyper-V administrator, I can shut down the VM, copy the virtual disks for offline attacks, or install malware
Public cloud
Fabric administrators could potentially have full access to tenant VMs
3
Shielded Virtual Machines
Strong separation between the fabric administrators and the workload administrators, implemented through encryption and protected secrets
4
Fabric/virtualization administratorSlide35
So what is a“Shielded Virtual Machine”?
The data and state of a Shielded VM are protected against inspection, theft, and tampering from both malware and datacenter administrators11 Fabric admins, storage admins, server admins, network adminsSlide36
.VHDX
.VHDX
.VHDX
Step 1: How things look today
Hyper-V
Server administrator
Storage administrator
Network administrator
Backup operator
Virtualization-host administrator
Yes
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Physical machines
Virtual machines
Computer room
PerimeterSlide37
Step 1: Encrypt VM-state and data
Step 1: How things look today
.VHDX
.VHDX
.VHDX
Hyper-V
Server administrator
Storage administrator
Network administrator
Backup operator
Virtualization-host administrator
Yes
No
No
No
No
Yes
Yes
Yes
Yes
Yes
Physical machines
Virtual machines
Computer room
Perimeter
Configuration dependent
No
No
No
NoSlide38
Cloud datacenter
Fabric controllerHyper-V host 1Hypervisor
Host OS
Guest VM
Guest VM
Guest VM
Hyper-V host 2
Hypervisor
Host OS
Guest VM
Guest VM
Hyper-V host 2
Hypervisor
Host OS
Guest VM
Guest VM
Step 2:
Decryption keys controlled by external system
Key protection
Host guardian service
Please sir, may I have some more keys?
Sure, I know you and you look
healthySlide39
Building block #1: Generation 2 VMs
Boot from virtual UEFI firmwareThis provides secure boot, ensures neither the UEFI firmware nor the VM’s startup files can be tampered withAlso enables BitLocker disk encryption to be used inside the VM’s virtual disksModern OS supportGeneration 2 supports Windows Server 2012/Windows 8 and laterWorking to support Windows Server 2008/2008 R2Slide40
Building block #2: Guarded Fabric
Host Guardian Service (HGS): Windows Server role used to implement the hardened fabricHGS provides attestation and key distribution services so that guarded hosts can run shielded VMsGuarded hosts: A host in the fabric on which shielded VMs can run. Guarded hosts must be identified prior to being trusted, and must be configured appropriately in order to pass attestationAttestation: The process of the Host Guardian Service verifying that a host is part of the fabric, a guarded host, and the state of its configurationKey distribution: The operation of delivering a key to a guarded host so that it can unlock and run shielded VMsThe HGS service must run in its own active directory domain and must be isolated from the current fabric AD infrastructureSlide41
Converged networking with 2016
WS2012 R2 Hyper-V Host (with converged)Example 2 x 10GbE + 2 x 10GbE RDMA NICsManagement OSVM(s)
20GbE Team 1
Hyper-V vSwitch
10GbE
N1
10GbE
N1
RDMA N1
RDMA N2
DCB policies configured for management, storage, migration,
& clustering traffic
Utilizes SMB Multichannel
& SMB Direct
VM
vNIC
WS2016 Hyper-V Host (with converged)Example 2 x 10GbE RDMA NICs
VM(s)
VMvNIC
Management OS10GbE RN1
10GbE RN2Hyper-V vSwitch (SDN) with SETHostvRNIC1 HostvNIC3
HostvRNIC2 HostvNIC5 HostvNIC4 Slide42
Guest clustering with Shared VHDXNot bound to underlying storage topology
Flexible and secure Shared VHDX removes need to present the physical underlying storage to a guest OS*NEW* Shared VHDX supports online resizeStreamlined VM shared storage Shared VHDX files can be presented to multiple VMs simultaneously, as shared storageThe VM sees shared virtual SAS disk that it can use
for clustering at the guest OS and application level
Utilizes SCSI-persistent reservations
Shared VHDX can reside on a Cluster Shared Volume (CSV) on block storage, or on SMB file-based storage
*NEW* protected
Shared VHDX supports Hyper-V Replica and
host-level backup
CSV on
block storage
SMB Share
file-based storage
Guest
cluster
Shared
VHDX files
Guest
cluster
Shared
VHDX files
Hyper-V
host clustersSlide43
Nano ServerSlide44
The next step in the journey…
Nano Server
Nano Server:
A new
headless
, 64-bit only, deployment option for Windows Server
Server
Core
Deep refactoring with cloud emphasis
Cloud fabric & infrastructure (clustering, storage, networking)
Born-in-the-cloud applications (PaaS v2, ASP.NET v5)
VMs & Containers (Hyper-V & Docker)
Server
with a desktop experience
Extend the Server Core pattern
Roles & features live outside of Nano Server
No binaries or metadata in OS image
Standalone packages install like apps
Full driver support
AntimalwareSlide45
Deployment improvements
Setup time (Sec)Disk footprint (GB)VHD size (GB)Slide46
Remote Management by Default;Easy access to IP InformationSlide47
For the leanest image, install just the drivers your hardware requires.Dism /Add-Driver /driver:<path>Nano Server includes a package of all drivers in Server Core
Dism /Add-Package /PackagePath:.\packages\Microsoft-NanoServer-OEM-Drivers-Package.cabPackages are provided for:Hyper-V HostFile Server HostFailover ClusteringNano as a VMAll OEM Drivers (in Server Core)Reverse ForwardersDrivers, Roles and FeaturesSlide48
Manage Using Familiar Tools:
Server Manager; Computer Management; PowerShell; PowerShell Direct (VMBus); System Center; Visual Studio and moreSlide49
Shifting needs in IT management
Management as a service
Micro services and containers
Support for heterogeneous environments
Cloud-inspired
Modern IT
managementSlide50
Management anywhere
Next generation cloud management solutionMulti-cloud, multi-platform supportUnified management across infrastructure and servicesAzure | AWS
Modern
management
Any cloud, any platformSlide51
Microsoft’s hybrid cloud IT management solution
Operations Management Suite
System Center
Extend your datacenter investments into hybrid cloud
Unleash modern IT management scenarios with SC and OMS
REAL-TIME
VISIBILITY
SEAMLESS IT AUTOMATION
CLOUD-ENABLED PROTECTION
ROBUST THREAT ANALYSIS
&Slide52
New automation
capabilitiesBuilt-in integration with on-premises systems and PowerShell DSC nodes Run Azure Automation Runbooks on-premisesAutomation accessible via new REST API (including GitHub, VSO, and ARM)Graphical workflow-authoring tool Runbook management from the new Microsoft Azure portalSlide53
ContainersSlide54
ContainersA new approach to build, ship, deploy, and instantiate applications
Physical
Applications traditionally built and deployed onto physical systems with
1:1 relationship
New applications often required new physical systems for isolation of resources
Higher consolidation ratios and
better utilization
Faster app deployment than in a traditional, physical environment
Apps deployed into VMs with
high compatibility success
Apps benefited from key VM
features i.e., live migration, HA
Physical/virtual
Key benefits
Further accelerate of app deployment
Reduce effort to deploy apps
Streamline development and testing
Lower costs associated with app deployment
Increase server consolidation
Package and run apps within
containers
VirtualSlide55
ContainersIsolated runtime environment for hosted applications
DependenciesEvery application has its own dependencies which includes both software (services, libraries) and hardware (CPU, memory, storage)VirtualizationContainer engine is a light weight virtualization mechanism which isolates these dependencies per each application by packaging them into virtual containersShared host OSContainer runs as an isolated process in user space on the host OS, sharing the kernel with other containers
Flexible
Differences in underlying OS and infrastructure are abstracted away, streamlining “deploy anywhere” approach
Fast
Containers can be created almost instantly, enabling rapid scale-up and scale-down in response to changes in demand
Container
App A
Bins/libraries
App B
Bins/libraries
Container management stack
Host OS with container support
Server
http://channel9.msdn.com/blogs/containersSlide56
Container ecosystem
Container runtimeLinux
Container images
Image repository
Application framework
ApplicationSlide57
Container Run-time
Host Operating SystemWindows ServerContainersSlide58
Container Run-time
HostOperatingSystemVirtual machine(s)Hyper-V Hypervisor
Hyper-V
Container(s)
Windows Server
Container(s)Slide59
Container Run-time
HostOperating SystemVirtual machine(s)Hyper-V Hypervisor
Windows Server
Container(s)
Hyper-V
Container(s)
Hyper-V HypervisorSlide60
Your cloud provider is your partner
Responsibility
On-
Prem
IaaS
PaaS
SaaS
Data classification
and accountability
Client & end-point
protection
Identity & access
management
Application
level controls
Network controls
Host Security
Physical Security
Cloud Customer
Cloud Provider
Provider management of risk
Physical | Networking
Shared management of risk
Identity & access management
Customer management of risk
Data Classification | End Point DevicesSlide61
Play with Technology…VMware to Hyper-V Migration
Supported & Free – Quick and easy to download, use and start conversions of VMware VMs on ESXi 4.1/5.0/5.1/5.5Convert to 2012 – Converts and deploys VMs or virtual disks from VMware hosts to Hyper-V 2008 R2 SP1/2012/2012 R2Scriptable – to integrate with automated workflowsOS Support – Supports Windows Server 2008/2008 R2/2012/2012 R2, along with Windows Vista/7/8/8.1Linux OS Support – Red Hat 5/6, Ubuntu 10.04/12.04, SUSE 11, CentOS 5/6, MoreClean
– Snapshots VM, then removes VMware Tools, converts, then installs Hyper-V IC’s as needed.
Conversion with the Microsoft Virtual Machine Converter
https://technet.microsoft.com/en-us/library/dn873998.aspxSlide62
Virtualization resources and feedback
Download Windows Server 2016 Preview:http://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-technical-previewExplore Technical Preview documentation:https://technet.microsoft.com/en-us/library/mt420609.aspx Explore Containers documentation:https://msdn.microsoft.com/virtualization/ Explore Nano Server documentation:https://technet.microsoft.com/en-us/library/mt126167.aspx Uservoice:https://windowsserver.uservoice.com/forums/295050-virtualization Slide63
Deep technical content and free product evaluations
Hands-on deep technical labs
Free, online,
technical courses
Download Microsoft software trials today.
Find Hand On Labs.
Take a free online course.
Technet.microsoft.com/evalcenter
Technet.microsoft.com/
virtuallabs
microsoftvirtualacademy.com
At the TechNet Evaluation Center you can download free, trial versions of Microsoft software, with no feature limits. Dozens of trials are available – all at no cost.
Try Windows Server 2012 R2 for up to 180 days. Download the Windows 8.1 Enterprise 90-day evaluation. Or try Microsoft Azure at no-cost for up to 90 days.
Microsoft Hands On Labs offer virtual environments that will take you through guided, technically deep product learning experience.
Learn at your own pace in labs that you can complete in 90 minutes or less. There is no complex setup or installation is required to use TechNet Virtual Labs.
Microsoft Virtual Academy provides free online training on the IT scenarios that are important to your company and your career.
Learn at your own pace and boost your IT skills with over 100 courses across more than 15 Microsoft technologies including Windows Server, Windows 8, Microsoft Azure, Office 365, virtualization, Windows Phone, and more. TechNet Virtual LabsSlide64
Next Steps – Keep LearningWhat technology is available from Microsoft to help you solve business problems!
Continue Learning About Technology… Expand your capabilities to do your job while also expanding your careerDedicated Certification Jump StartDedicated full day brainstorming Problem/Solution workshopDedicated full day technology training (eg. http://aka.ms/CloudInfrastructure)Continue Learning … Brad Anderson: Cloud Blog http://aka.ms/InTheCloud Dan Stolts blog http://ITProGuru.com Microsoft Virtual Academy http://MicrosoftVirtualAcademy.com Dan’s email: dstolts@Microsoft.com