Quantcast
Channel: System Center: Virtual Machine Manager Engineering Blog
Viewing all 46 articles
Browse latest View live

A host refresh in the System Center Virtual Machine Manager 2008 Administrators console fails with error 2912

$
0
0

KBHere's another KB we published this morning.  This one talks about an issue where doing a host refresh in the SCVMM 2008 admin console generates error 2912 with 0x800700A4:

=====

Symptoms

In the System Center Virtual Machine Manager 2008 (SCVMM) Administrators console, a host refresh may fail with the following error:

Error (2912)
An internal error has occurred trying to contact an agent on the agent %servername%.contoso.com server.    (No more threads can be created in the system (0x800700A4))

Recommended Action
Ensure the agent is installed and running. Ensure the WS-Management service is installed and running, then restart the agent.

The hex code 0x800700A4 equates to ERROR_MAX_THRDS_REACHED

In addition, the following error message may be displayed in the System event log on the managed host:

Error 1605
“The processing of Group Policy failed. Windows could not evaluate the Windows Management Instrumentation (WMI) filter for the Group Policy object”

When this occurs the host status will also change from "Ok" to "Needs Attention".  Further inspection of the host properties will reveal that the agent status is "Not Responding".

Cause

Typically, the "Needs Attention" host status is displayed if the SCVMM server is unable to communicate with the agent on the managed host.  However, in this specific example the communication to the host is working normally (RDP and PING works) but the host is unable to perform any actions required to update the VMM server. 

Note : This issue is very rare and has only been reported in scenarios with large VM deployments on a managed host.

Resolution

This problem has been known to occur if the WMI service is non-responsive or backed up on the problem host.
1. Open the Services.msc snap in.
2. Click on Start followed by Run.
3. Type "services.msc" without the quotes and press Enter. This will open the Services snap-in
4. Right click on "Windows Management Instrumentation" and select "Restart"

Note : The following system components depend upon WMI:

·         Hyper-V Image Management Service
·         Hyper-V Networking Management Service
·         Hyper-V Virtual Machine Management
·         Internet Connection Sharing
·         IP Helper
·         Microsoft iSCSI Software Target
·         SMS Agent Host
·         SMS Task Sequence Agent
·         Virtual Machine Manager Agent

5. Right click on the "Virtual Machine Manager Agent" and select "Restart"

Note: If VMM is in the process of refreshing this host while the WMI service is restarting, it may result in the following error:

Error (2916)
VMM is unable to complete the request. The connection to the agent %server_name%.contoso.com was lost.
(Unknown error (0x80338126))

Recommended Action
Ensure that the WS-Management service and the agent are installed and running and that a firewall is not blocking HTTP traffic. If the error persists, reboot %server_name%.contoso.com and then try the operation again.

6. In the VMM administrators console, select the Hosts tab in the lower left hand corner and right click on the problem host and select "Refresh"

More Information

This error is not indicative of a problem with SCVMM, but more likely a Windows performance related issue on the managed host.  While the managed host is in this state, connectivity via PING or RDP should still function normally although expect delayed logon times and the Hyper-V snap-in may not load either local or remote.

Please refer to the following article for the recommended hotfixes for VMM: KB2397711 - Recommended hotfixes for System Center Virtual Machine Manager 2008 R2

=====

For the latest version of this article see the link below:

KB2472146 - A host refresh in the System Center Virtual Machine Manager 2008 Administrators console fails with error 2912

J.C. Hornbeck | System Center Knowledge Engineer

The App-V Team blog: http://blogs.technet.com/appv/
The WSUS Support Team blog: http://blogs.technet.com/sus/
The SCMDM Support Team blog: http://blogs.technet.com/mdm/
The ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
The SCOM 2007 Support Team blog: http://blogs.technet.com/operationsmgr/
The SCVMM Team blog: http://blogs.technet.com/scvmm/
The MED-V Team blog: http://blogs.technet.com/medv/
The DPM Team blog: http://blogs.technet.com/dpm/
The OOB Support Team blog: http://blogs.technet.com/oob/
The Opalis Team blog: http://blogs.technet.com/opalis

clip_image001clip_image002


KB: Changing the owner of a VM in System Center 2012 Virtual Machine Manager causes the console to become unresponsive

$
0
0

imageHere’s a new Knowledge Base article we published this morning. This one talks about an issue you can run into if your AD groups have circular references.

=====

Symptoms

After changing the Self-Service Owner of a Virtual Machine (VM) to an AD Security Group in System Center 2012 Virtual Machine Manager, the console becomes unresponsive and after a few minutes displays the following:

Attempting to reconnect

Another dialog maybe also be shown with the following:

An unknown error occurred while executing the PowerShell script:

The connection to the VMM management server <VMM Server> was lost. Ensure that the <VMM Server> is online and that you can access the server remotely from your computer. Then connect to the <VMM Server> and try the command again using the new connection. Or, you can ensure that the Virtual Machine Manager service is started on <VMM Server>. Then connect to<VMM Server> and try the command again using the new connection. If the command fails again because of a connection failure, restart the Virtual Manager service and then try the operation again.

Try the operation again. If the issue persists contact Microsoft Help and Support

ID: 27235

The Event logs will contain the following:

Log Name: System
Source: Service Control Manager
Event ID: 7031
Level: Error
Description: The System Center Virtual Machine Manager service terminated unexpectedly. It has done this <#> times(s). The following corrective action will be taken in 100 milliseconds: Restart the service.

Log Name: Application
Source: Application Error
Event ID: 1000
Level: Error
Description:
Faulting application name: vmmservice.exe, version: 3.0.####.0, time stamp: 0x4e92b38a
Faulting module name: KERNELBASE.dll, version: 6.1.7601.17651, time stamp: 0x4e21213c
Exception code: 0xe053534f
Fault offset: 0x000000000000cacd
Faulting process id: 0x%9
Faulting application start time: 0x%10
Faulting application path: %11
Faulting module path: %12
Report Id: %13

Cause

This can occur if the AD security group's membership is such that it is part of a circular membership. In the following example, adding any of the AD groups would result in the failure because Group_Users is a member of Group_VMMSSU and contains references to Group_VMMSSU:

Group_VMMSSU
> Group_Users
> > Group_VMMSSU

> Group_Admins
> > Group_2

It is this circular membership that results in the vmmservice encountering a StackOverflowException [Exception code: 0xe053534f] and terminating unexpectedly.

Resolution

To resolve this issue, review the AD group membership for any circular references and remove them. If the circular reference is not obvious, the script below can list the nested members of a particular group.

NOTE Use Active Directory Users and Computers to determine the top most group of the group causing issues.

dsquery group -name "Group_VMMSSU" | dsget group -members -expand

=====

For the most current version of this article please see the following:

2680843 : Changing the owner of a VM in System Center 2012 Virtual Machine Manager causes the console to become unresponsive

J.C. Hornbeck| System Center & Security Knowledge Engineer

Get the latest System Center news onFacebookandTwitter:

clip_image001clip_image002

App-V Team blog: http://blogs.technet.com/appv/
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
Operations Manager Team blog: http://blogs.technet.com/momteam/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Endpoint Security blog : http://blogs.technet.com/b/clientsecurity/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

KB: The System Center 2012 Virtual Machine Manager console terminates unexpectedly with NullReferenceException

$
0
0

imageHere’s a new Knowledge Base article we published. This one talks about an issue where the SCVMM 2012 console terminates with NullReferenceException after adding an ESX 4.1 host.

=====

Symptoms

After adding an ESX 4.1 host to System Center 2012 Virtual Machine Manager (VMM) fabric, the VMM console may terminate unexpectedly.
In reviewing the application log you find the following event:

Log Name: Application
Source: Windows Error Reporting
Event ID: 1001
Task Category: None
Level: Information
Keywords: Classic
User: N/A
Description:
Fault bucket , type 0
Event Name: VMM20
Response: Not available
Cab Id: 0

Problem signature:
P1: vmmservice
P2: 3.0.6019.0
P3: E.Adhc.Operations
P4: 3.0.6019.0
P5: M.V.E.A.VMWareESXHostDataProperties.GetHostManagementPorts
P6: System.NullReferenceException
P7: 6b59
P8:
P9:
P10:

or

Log Name: Application
Source: Windows Error Reporting
Event ID: 1001
Task Category: None
Level: Information
Keywords: Classic
User: N/A
Description:
Fault bucket , type 0
Event Name: VMM20
Response: Not available
Cab Id: 0

Problem signature:
P1: vmmservice
P2: 3.0.6019.0
P3: VMWareImplementation
P4: 3.0.6005.0
P5: M.C.V.VmwVMService.PopulateDistributedNetworkingData
P6: System.NullReferenceException
P7: 3b81
P8:
P9:
P10:

NOTE To ensure you are encountering the issue discussed here, verify that the values shown in the Windows Error report log have the same values for P5 and P6 as seen in one of the above examples

Cause

This is a known issue in System Center 2012 Virtual Machine Manager. The issue is related to the absence of a standard VMware virtual switch (vSwitch) on the VMware hosts. The VMM refresher fails to handle such a configuration.

Resolution

To verify the problem host perform the following steps:

Open vSphere Client
- Open Hosts and Clusters
- Select Host, Go to Configuration tab
- Select Networking, you should see no vSphere Standard Switches.

To workaround this issue, create a vSwitch on each failing host using the VMware management tools such as vSphere client.

=====

For the most current version of this article please see the following:

2709961 - The System Center 2012 Virtual Machine Manager console terminates unexpectedly with NullReferenceException

J.C. Hornbeck| System Center & Security Knowledge Engineer

Get the latest System Center news onFacebookandTwitter:

clip_image001clip_image002

App-V Team blog: http://blogs.technet.com/appv/
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
Operations Manager Team blog: http://blogs.technet.com/momteam/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Endpoint Security blog : http://blogs.technet.com/b/clientsecurity/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

KB: Attempting to remove VMware vCenter from System Center 2012 Virtual Machine Manager fails with error 0x8007274D

$
0
0

imageHere’s a new Knowledge Base article we published. This one talks about an issue where attempting to remove VMware vCenter from VMM 2012 fails with error 0x8007274D.

=====

Symptoms

When trying to remove the VMware vCenter 4.1 from System Center 2012 Virtual Machine Manager (VMM), the action fails with the error:
VMM cannot complete the VMware operation on the SERVERNAME$ server because of the error: Unable to connect to the remote server
Resolve the issue in VMware and then try the operation again.

ID: 12701
Details: No connection could be made because the target machine actively refused it (0x8007274D)
Also, every few minutes the following error is displayed under the Jobs tab:

Error (12701)
VMM cannot complete the VMware operation on the SERVERNAME$ server because of the error: Unable to connect to the remote server
No connection could be made because the target machine actively refused it (0x8007274D)

Recommended action
Resolve the issue in VMware and then try the operation again.

Cause

System Center 2012 Virtual Machine Manager needs to communicate with the VMware vCenter in order to remove it from the VMM server. In situations when VMM is not able to communicate with the VMware vCenter (i.e. vCenter server was lost or network issues), it is not possible to directly remove the VMware vCenter.

Resolution

One option is re-install VMM with the new database.

The second option requires a few steps. In summary, a new virtual machine needs to be created and then joined to the domain under the same name as the previous vCenter server. VMware vCenter server will need to be also installed on this virtual machine. By doing this, VMM will think that the old vCenter server is back. However, since by default the communication between the VMM and vCenter servers is encrypted, VMM will give an error stating that it cannot communicate with vCenter server because of the invalid certificates. Thus, we will also have to generate a new vCenter certificate on the VMM server. More detailed steps are shown below:

1. Create a new Virtual Machine.

2. Install Windows Server 2008 R2 (or older Windows version supported by VMware vCenter) with the required updates.

3. Join the Virtual Machine to the domain under the same computer name as the original computer with which the contact was lost. For example, if the original vCenter server's computer name was vcenter.contoso.com then the newly created Virtual Machine should be joined to the domain as vcenter.contoso.com.

4. Install VMware vCenter and VMware vSphere client on the newly created VM.

5. On the VMM server, open the Certificates Snap-in (Computer Account) (http://msdn.microsoft.com/en-us/library/ms788967.aspx) and delete the VMware default certificate located under Trusted People/Certificates.

6. Launch the VMM PowerShell on the VMM server, type and run the following command:

$Virtman = Get-virtualizationmanager –computername “VirtMgrServer01.Contoso.com”
$Cert = Get-certificate –computername “VirtMgrServer01.Contoso.com”
Set-VirtualizationManager –VirtualizationManager $VirtMan –Certificate $Cert

Where VirtMgrServer01.Contoso.com is the FQDN of your newly created VMware vCenter server.

7. In the VMM console, right click on the VMware vCenter server and select Refresh. vCenter server should be successfully refreshed.

8. Right click on the VMware vCenter and select Remove. The vCenter should be successfully removed from the VMM server.

More Information

How to: View Certificates with the MMC Snap-in: http://msdn.microsoft.com/en-us/library/ms788967.aspx
How to Replace the Certificate for a VMware VirtualCenter Server: http://technet.microsoft.com/en-us/library/cc974213

=====

For the most current version of this article please see the following:

2730029 - Attempting to remove VMware vCenter from System Center 2012 Virtual Machine Manager fails with error 0x8007274D

J.C. Hornbeck| System Center & Security Knowledge Engineer

Get the latest System Center news onFacebookandTwitter:

clip_image001clip_image002

App-V Team blog: http://blogs.technet.com/appv/
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
Operations Manager Team blog: http://blogs.technet.com/momteam/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Endpoint Security blog : http://blogs.technet.com/b/clientsecurity/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

Updated guide for deploying Software Load Balancer using Microsoft VMM 2016 Tech Preview 4

$
0
0

NOTE This guide is an updated version of the guide previously published here.

=====

Introduction

This article helps you evaluate the Software Defined Networking (SDN) features in Windows Server 2016 Technical Preview and Virtual Machine Manager 2016 Technology Preview 4. In particular, this topic is focused on scenarios that incorporate Microsoft Software Load Balancer (SLB) with System Center Virtual Machine Manager (VMM).

Once you deploy Software Load Balancer along with Network Controller in your VMM 2016 Technical Preview set up, you can also leverage multiplexing and NAT capabilities in your datacenter.

Prerequisites

Before we get into details of Software Load Balancer deployment, make sure you have performed the following steps:

1. Deploy Network Controller

This document assumes that you already have Network Controller on boarded into VMM management. If you have Network Controller deployed in your set up, you will have the basic compute and network infrastructure in place to proceed for SLB deployment.

For more details on requirement related to different Hosts, virtual machines, Logical Networks, Subnets, IP Pools, and switches, please refer to the Network Controller deployment guide here.

If you haven’t deployed Network Controller yet, please refer to the Network Controller guide above and come back to this section after deploying Network Controller.

2. Prepare an SSL Certificate

The SLB service template requires that an SSL certificate be prepared prior to importing the service template. You should already have these certificates ready as part of Network Controller deployment. To revisit steps on how to prepare SSL certificates click here. You should right click on this SSL certificate that was created earlier during Network Controller deployment and export it without a password in .CER format. This certificate will be later placed inside the NCCertificate.CR folder, details for which are included in the later sections.

3. An available Windows Server host

In addition to hosts that you already have in your Network Controller set up, you will require one additional host (also referred to as ‘Edge host’) to deploy Software Load Balancer, according to the shown diagram. Optionally, you can choose one of the existing hosts in your set up to deploy SLB.

Set up

This section covers the setup required for deploying the Software Load Balancer and optionally the BGP router.

Topology overview

image

The topology consists of four physical hosts, one Network Controller virtual machine, two tenant virtual machines, one Software Load Balancer MUX virtual machine, and optionally one Router – BGP Peer virtual machine. Most of these hosts and virtual machines would already be configured as part of Network Controller on deployment.

You will need to deploy one additional host (the ‘Edge Host’) and two additional virtual machines for Software Load Balancer deployment. All of the virtual machines require an operating system VHD and you can download the Windows Server 2016 Technical Preview 4 ISO image here.

Logical Networks

In addition to the Management and the Backend logical networks that you already have configured during Network Controller deployment, you will need the following networks to deploy SLB.

Network Name Subnet Mask VLAN ID on trunk Gateway
Front End (or Transit): Used as SLB Front end networks. 10.60.35.0 24 10 10.60.35.1
Public IP Network: Used to assign IP address if SLBM. 10.128.134.116 27 NA 10.128.134.117

clip_image003 NOTE  Active Directory and DNS must be available and reachable from these subnets. You must have Domain Admin credentials and the ability to create DNS entries in the domain if you choose to use an existing Active Directory domain.

Create the Front End logical network

The Front End network is used for northbound connections in SLB MUX virtual machines and BGP peer virtual machine. To create the Front End logical network, complete the following:

  1. Start the Create Logical Network Wizard.
  2. Type a name and optional description for this network, then click Next.
  3. On the Settings page, ensure you select One Connected Network. You can also check Create a VM network with the same name box to allow virtual machines to access this logical network directly and the Managed by the Network Controller box, then click Next.
  4. On the Network Site panel, add the network site information for your VIP subnet. This should include the Host Group and subnet information for your VIP network.
  5. Review the Summary information and complete the Logical Network wizard.

Create the Public IP logical network

You need an IP address pool for public IPs and to assign an IP address to SLBM. Public IPs are also used for tenant services that need an internet identifiable public IP address. We will create a Public Logical network in order to specify IP address pool for Public network. To create the  Public Logical network, complete the following:

  1. Start the Create Logical Network Wizard.
  2. Type a name and optional description for this network. Click Next.
  3. On the Settings page, ensure you select One Connected Network. You can also check Create a VM network with the same name box to allow virtual machines to access this logical network directly and the Managed by the Network Controller box then click Next.
  4. On the Network Site panel, add the network site information for your Public Network. This should include the Host Group and Subnet information.
  5. Review the Summary information and complete the wizard.

Create IP address pools required for SLB deployment

Create an IP pool for Front End addresses

clip_image001[6] TIP While creating IP address pools for NC managed networks, you MUST use a value for Starting IP Address that is at least 4 IP addresses into the Address range for the IP Subnet. The Network Controller uses the first three IP addresses of the network range. For example, if your IP subnet is 192.168.0.0/24, you should use 192.168.0.4 as your starting IP address.

This is an IP pool from where DIPs will be assigned to the SLB MUX virtual machines and BGP Peer virtual machine.

Create the IP pool for the Front End network following the same procedure and steps mentioned in the Network Controller guide. Be sure to use the IP address range that corresponds to your Front End network IP address space.

clip_image003 NOTE After you have created all the required logical networks and IP pools, make sure you associate newly create Front End logical network with the SDN uplink port profile you created during Network Controller deployment.

Deploy the Management and SDN logical switch to the Edge host

You should already have an SDN logical switch and a management logical switch available in your setup as part of Network Controller deployment.

If the SDN Switch with Front end and Back end port profiles is not deployed already to the edge host where SLB MUX VMs are going to be deployed, deploy the SDN switch to the host now. Similarly, if the Management logical switch is not deployed on the Edge Host yet, deploy the Management logical switch on the host.

Please refer to Network Controller deployment guide here to learn about deploying SDN and Management logical switches to a host.

Deployment

Now you can deploy the Software Load Balancer MUX into your SDN infrastructure.

Download the service template to a local computer

First you need to download the SLB MUX service template from here and save it to a folder on your VMM server or a file share that your VMM server has access to.

Add template resources to the VMM Library

Before you import the SLB MUX service template you need to do the following in order to add the custom resources to the VMM library:

  1. Copy the .CER certificate that you previously created for the Network Controller to the NCCertificate.CR folder.
  2. Add the custom NCCertificate.CR and EdgeDeployment.CR custom resources to the VMM library:

a. In VMM, navigate to Library.
b. In the top of the left pane, in the Templates section, select Service Templates.
c. In the ribbon at the top, click Import Physical Resource.
d. Click Add Custom Resource and navigate to the folder where you copied the Gateway Service Template files. Select the EdgeDeployment.cr and NCCertificate.cr folders and click OK.
e. Under Select Library server and destination for imported resources, navigate to your VMM library server and click OK.
f. Click Import to import the custom resources.

Import the service template

Now you can import the SLB MUX service template to the VMM library. To import the service template into the VMM library, complete the following:

  1. In VMM, navigate to Library.
  2. In the top of the left pane, in the Templates section, select Service Templates.
  3. In the ribbon at the top, click Import Template.
  4. Browse to your service template directory, then select the SLBMuxServiceTemplate.2.0.xml file that you downloaded and follow the prompts to import it.
  5. The service template uses the following virtual machine configuration parameters, so update the parameters to reflect the configuration of your environment as you import the service template.

Configuration parameters:

Resource Type

Resource Name and Description

Library Resources

Resource name: WinServer.vhd

Description: Windows Server Virtual Hard Disk. Format should be VHD. Select the base VHD image that you prepared earlier and imported into your VMM library.

=====

Resource name: NCCertificate.cr

Description: A custom library resource that contains the trusted root certificate (.CER) for the Network Controller.  This will be used for secure communications between the Network Controller and the SLB MUX instances.

Map to the NCCertificate.cr library resource in your VMM library.

=====

Resource Name: EdgeDeployment.cr

 

Description: A custom library resource that contains an SSL Certificate in .PFX format.

Select the EdgeDeployment.cr library resource that you prepared earlier and imported into you VMM library.

Configuring the deployment

Follow these steps to deploy an SLB MUX service instance.

Configure the deployment

  1. Select the SlbMuxServiceTemplate service template and click Configure Deployment to begin. Type a name and optionally a destination for the service instance. The destination must map to a Host Group that contains the hosts configured previously.
  2. In the Network Settings section, you must map the networks as follows:
Network setting Value
DatacenterNetwork Map this to your Front End or transit VM network.
ManagementNetwork Map this to your Management VM network.

After you are done with mapping the destination and network settings, the Deploy Service dialog appears. It is normal for the virtual machine instances to be initially red. Click Refresh Preview to automatically find suitable hosts (from the destination you mapped earlier) for the virtual machine. This can be can be done manually if needed.

3. On the left side of the Configure Deployment window there are a number of settings that you must configure. The table below summarizes each field:

Setting Requirement Description
Datacenter Network Required Your External or transit VM network
Management Network Required Choose the Management VM Network that you created for host management.
LocalAdmin Required Select a Run as account in your environment that will be used as the local Administrator on the virtual machines. User name should be .\Administrator
SelfSignedConfiguration Required If you are using a self-signed certificate you created yourself, set this value to TRUE. If you are using a certificate that has been assigned by an Enterprise CA or external Root CA, set this value to FALSE.
MgmtDomainAccount Required Select a Run as account in your environment which will be used to prepare the Network Controller. This user must be a member of the management security group, specified below, which has privileges to manage the network controller.
MgmtDomainAccountName Required This must be the full username (including domain name) of the Run as account mapped to MgmtDomainAccount.Example: contoso\username.
clip_image003 NOTE
The domain username will be added to the Administrators group during deployment.
MgmtDomainAccountPassword Required Password for the management Run as account mapped to MgmtDomainAccount.
MgmtDomainFQDN Required Fully qualified domain name for the Active directory domain that the network controller virtual machines will join.Example: Contoso.com

Deploy the SLB MUX service

After you configure these settings, you can click Deploy Service to begin the service deployment job. Deployment times will vary depending on your hardware but are typically between 30 and 60 minutes.

When the service deployment job has completed, verify that your service appears in the VMM console:

  1. Open the VMs and Services workspace.
  2. Click Services in the ribbon.
  3. Verify that your SLB MUX service instance appears in the VM Network Information for Services window.
  4. Right-click the SLB MUX service and select Properties from the menu. Verify that the state is Deployed.

Configure the SLB role and SLB MUX Instance Properties

Now that the service is deployed you can configure its properties. This involves associating the VM instance that we deployed using the SLB MUX service template, and then configuring BGP peering between the SLB MUX instance and a router.

Associate the SLB Service Role with the SLB MUX Instance

  1. Open the Fabric workspace.
  2. Click Network Service to display the list of network services installed.
  3. Right-click the FabricNetworkManagerNetworkController service and select Properties.
  4. In the Wizard, click on Load Balancer Role and enter the last IP from the Public VIP pool as Management IP address. Although you will create a Public IP address pool in later sections, you will already have a fair idea of IP address range you plan to reserve through this IP pool. Click OK.

clip_image006

5. Find the Associated Service field under Service information and click Browse.

6. Select the SLB MUX service instance you created earlier and click OK.

clip_image007

The Service instances that you deployed are now associated with the Load Balancer role, and you should see the SLB MUX virtual machine instance listed under the Load Balancer role.

Create an IP pool for Public IP addresses

This step needs to be performed at this stage when Software Load Balancer is on boarded into VMM. This makes sure that the created VIP pool is advertised using SLB manager VIP (management IP shown above).

clip_image001[13] TIP While creating IP address pools for NC managed networks, you MUST use a value for Starting IP Address that is at least 4 IP addresses into the Address range for the IP Subnet. The Network Controller uses the first three IP addresses of the network range. For example, if your IP subnet is 192.168.0.0/24, you should use 192.168.0.4 as your starting IP address.

1. Right-click the Public logical network in VMM and select Create IP Pool from the drop down menu.

2. Provide a name and optional description for the IP Pool and ensure that the Public Logical network is selected for the logical network. Click Next.

3. Accept the default network site as shown in below screen shot and click Next.

clip_image003

4. Choose a starting and ending IP address for your range that contains the entire address range of your Public VIP subnet.

5. In the IP addresses reserved for load balancer VIPs box, type the entire IP addresses range in the subnet. This should match the range you used for starting and ending IP addresses. You do not need to provide gateway, DNS or WINS information as this pool is used to allocate IP addresses for VIPs only via the Network Controller, so skip these screens by clicking Next.

6. Review the summary information and complete the wizard.

Validation

Once you have deployed SLB MUX in your setup, you can validate the deployment by configuring peering of the SLB MUX instance and a BGP router (or RRAS VM), assigning a public IP to a tenant VM or Service, and accessing the tenant VM\service from outside the network.

Configure BGP Peering between the SLB MUX instance and a router

In order to publish the VIP network and addresses to networks outside of your private cloud, you will need to configure Border Gateway Protocol (BGP) peering between the SLB MUX and your external router.

1. First you will need to obtain the IP address and the Autonomous System Number (ASN) of the router that you want to peer with, so start by opening the Fabric workspace.

2. Right-click the FabricNetworkManagerNetworkController service and select Properties.

3. Click the Services tab and select the Load Balancer Role in the list of services.

4. Click the SLB MUX virtual machine instance and you will see the MUX instance BGP settings. For the BGP port, type the value 8560 and for Local ASN, type the ASN number you want to use for BGP peering for the MUX. VMM will accept any value you pick here but if you are peering it with a router in your infrastructure it should match the numbering scheme in your lab or datacenter. In the example below we used a value of 2 for the ASN.

clip_image008

5. To configure the information for the BGP router you want to peer with, click Add and then enter the name, IP address and ASN number of the router you want to peer with. In the screen shot above, you can see that we have peered with the ADVWRKS-ROUTER router using an IP address of 172.27.0.1 and an ASN of 1.

Click OK to complete the SLB MUX service instance configuration.

6. Check the Jobs window to verify that the Update Fabric Role with required configuration and Associate service instance with fabric role jobs have completed successfully.

7. In order to complete the BGP peering operation, you will need to configure BGP to peer with your SLB MUX instance on the router. If you are using a hardware router device, you will need to consult your vendor’s documentation on how to setup BGP peering for that device. You will also need to know the IP address of the SLB MUX instance that you deployed earlier. To do this, you can either log on to the SLB MUX VM instance and obtain the IP address by running IPCONFIG /ALL from a Command Prompt, or from the VMM console.

Provisioning VIPs for tenant virtual machines

You can provision VIPs for tenant virtual machines either individually for each virtual machine or via service templates. Provisioning a VIP for a single virtual machine is not a typical scenario, but for Tech Preview 4 it may be the easiest way to evaluate this functionality. Provisioning a VIP for a single virtual machine must be done via PowerShell.

Provision VIPs for an individual virtual machine

To provision a VIP for an individual VM or set of VMs that were deployed using a VM template, you will need to deploy the VM instances using a VM template, create a VIP template in the VMM console, then create a VIP and assign it to the VMs using PowerShell.

Create a VIP Template

The process for creating a VIP template is as follows:

  1. Navigate to the Fabric Workspace in the VMM console.
  2. Right-click on the VIP Templates node and select Create VIP Template. Alternately, you can click on the Create VIP Template in the Ribbon toolbar.
  3. Provide a name in the Template Name field and an optional description in the Description field.
  4. In the Virtual IP Port field, provide a value for the port you wish to test. For our example we used port 5001, but you can choose another port you want to test with if desired.
  5. For the Backend Port, provide a value for the port from which you wish to map traffic on the back end. In our example we simply used the same port as the front end virtual IP port: 5001. Once you have provided the port, click the Next button.
  6. On the Specify a Template Type screen, click the Specific radio button and select Microsoft for the Manufacturer, then for the Model, select Microsoft Network Controller. Click Next.
  7. On the Specify Protocol Options screen, select the protocol you wish to create a VIP mapping for. The HTTP and HTTPS options are commonly used, but for our simple example we selected the Custom option and chose TCP in the Protocol Name field. If TCP does not appear as an option in the drop-down menu you can type it in manually. This is a known issue in TP4. Click Next.
  8. You can optionally select enable persistence if you wish to have the load balancer make the connection from the client “sticky”. Click Next.
  9. For the Load Balancing method, select Round Robin from the drop down list. Click Next.
  10. Health Monitors are not implemented in TP4 so click Next to move past this screen.
  11. Confirm your settings and then click Finish when you are ready to create the VIP Template.

Create the VIP using PowerShell

clip_image009 Windows PowerShell for creating a VIP for an individual VM

The following is a sample Windows PowerShell script that will create a VIP for an individual VM. In the script parameters section, be sure to substitute the actual values that match your test environment for the samples that are used in this script. The script should be run on the VMM server, or on a machine with the VMM Admin Console.

=====

param(

[Parameter(Mandatory=$false)]

# Name of the Network Controller Network Service

# This value should be the name you gave the Network Controller service when you on-boarded
the Network Controller to VMM

$LBServiceName = “NC”,

[Parameter(Mandatory=$false)]

# Name of the VM instance to which you want to assign the VIP

$VipMemberVMNames =  @(“WGB-001”),

[Parameter(Mandatory=$false)]

# VIP address you want to assign from the VIP pool.

# Pick any VIP that falls within your VIP IP Pool range.

$VipAddress = “172.27.1.5”,

[Parameter(Mandatory=$false)]

# Name of the VIP VM Network

$VipNetworkName = vip,

[Parameter(Mandatory=$false)]

# The name of the VIP template you created via the VMM Console.

$VipTemplateName = “ADVWRKS-VIP”,

[Parameter(Mandatory=$false)]

# Arbitrary but good to match the VIP you’re using.

$VipName = “scvmm_172_27_1_5_5001”

)

Import-Module virtualmachinemanager

$lb = Get-scLoadBalancer where { $_.Service.Name -like $LBServiceName};

$vipNetwork = get-scvmnetwork -Name $VipNetworkName;

$vipMemberNics @();

foreach ($vmName in $VipMemberVMNames)

{

    $vm = get-scvirtualmachine -Name $vmName;

#    if ($vm.VirtualNetworkAdapters[0].VMNetwork.ID -ne $vipNetwork.ID)

#    {

#        $vm.VirtualNetworkAdapters[0] | set-scvirtualnetworkadapterVMNetwork $vipNetwork;

#    }

    $vipMemberNics += $vm.VirtualNetworkAdapters[0];

}

$existingVip = get-scloadbalancervip -Name $VipName

if ($existingVip -ne $null)

{

#    foreach ($mem in $existingVip.VipMembers)

#    {

#        $mem | remove-scloadbalancervipmember;

#    }

    $existingVip | remove-scloadbalancervip;

}

$vipt = get-scloadbalancerviptemplate -Name $VipTemplateName;

$vip = New-SCLoadBalancerVIP -Name
$VipName LoadBalancer $lb IPAddress $VipAddress LoadBalancerVIPTemplate $vipt FrontEndVMNetwork $vipNetwork BackEndVirtualNetworkAdapters
$vipMemberNics;

Write-Output “Created VIP “ $vip;

#foreach ($memberNic in $vipMemberNics)

#{

#    $address = $memberNic.IPv4Addresses[0];

#    Write-Output “Creating vip member with address ” $address;

#    New-SCLoadBalancerVIPMember LoadBalancerVIP $vipIPAddress $address -Port 82 –VirtualNetworkAdapter
$memberNic;

#}

$vip = get-scloadbalancervip -Name $VipName;

Write-Output “VIP with members “ $vip;

=====

After running the script, you should see output with details for the VIP you have just created. Once the script is executed successfully and the VIP is assigned to the tenant VM, you should be able to access the tenant VM from outside your datacenter network.

Manish Jha, Program Manager
Microsoft

KB: Error when you open the VMM console after you install UR7 or UR8 for VMM 2012 R2

$
0
0

Just a quick FYI on a KB article we recently published for VMM 2012 R2. After you install Update Rollup 7 or Update Rollup 8 for System Center 2012 R2 Virtual Machine Manager (VMM 2012 R2), you may see the following error message when you attempt to open the VMM admin console:

Console Add-ins Warnings and Errors
The following warnings and errors were encountered while loading console add-ins.
Your personal add-ins folder is editable by users other than yourself and the administrators group. This presents a potential security risk by which users could cause malicious code to be executed using your credentials. Please check the following folder and remove any permissions assigned to other users:
“C:\Program Files\Microsoft System Center 2012 R2\Virtual Machine Manager\bin\AddInPipeline\Addins\Domain_User”

Note that this issue occurs only when there’s a console add-in applied to Virtual Machine Manager. This error message can safely be ignored, however if you’d like to keep the error from occurring there’s a workaround in the following Knowledge Base article:

3138680 – Error when you open the VMM console after you install UR7 or UR8 for VMM 2012 R2 (https://support.microsoft.com/en-us/kb/3138680)

J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group

Deploying Highly Available Host Guardian Service using VMM Service Templates Windows Server and VMM Tech Preview 5

$
0
0

~ Maha Ibrahim | Senior Software Engineer

This post captures the steps needed to deploy Highly Available Host Guardian Service (HGS) using Microsoft System Center Virtual Machine Manager Technical Preview 5 to use for test or demo environments.

For more details outside the scope of this article, please refer to Windows Server TechNet articles about Guarded Fabric and Shielded VMs, or https://aka.ms/shieldedvms.

Requirements

  1. Microsoft System Center Virtual Machine Manager – Technical Preview 5 – Download link
  2. Windows Server 2016 Technical Preview 5 – Download link
  3. Windows Server 2016 Technical Preview 5 Virtual Hard Disk Image using GPT partition (for generation 2 VMs) which can be created using Wim2VHD – Download link

Install Steps

1. Download the compressed file from this Download link

2. Extract the custom resource folder ‘HostGuardianServiceScripts.cr’ and copy it to your VMM library, then refresh the library share.

3. Create a Run As Account to be used for the Local Administrator of the HGS machine.

4. Verify the Windows Server Technical Preview 5 VHDX (GPT partition image) is imported in VMM library.

5. Import the XML file as a VMM service template and map the resources according to resources included in the library.

clip_image002

6. If needed, open the computer tier properties and update the product key in the operating system configuration.

7. Save and configure deployment.

8. Specify the VM Network to be used.

clip_image004

9. Specify the service settings per the configuration of the desired deployment.

Example settings to deploy AD mode HGS server:

clip_image005

Example settings to deploy TPM mode HGS server:

clip_image006

10. For TPM Mode, if adding Code Integrity Policies, TPM Hosts and TPM policies is desired, then include the necessary files to your library, prior to the deployment of the service configuration, and per the folder structure below, if this step is skipped, then extra configurations are needed before the HGS instance can be used. Refer to https://aka.ms/shieldedvms for more details on how to create these files.

clip_image007

11. Click Deploy Service and wait for the job to complete.

12. Additional steps:

a. For Both TPM and AD setup: Configure name resolution between the existing fabric domain and the new HGS domain.

b. For AD Setup: verify that the hosts where guarding is desired are added to the AD group whose SID is added to the HGS.

13. Use the following URLs per the examples used in this document to configure guarded hosts, which in turn enables deploying shielded VMs:

  • AttestationServerUrl: http://MyHgsService.ReleCloud.com/Attestation
  • KeyProtectionServerURl: http://MyHgsService.ReleCloud.com/KeyProtection

Happy host guarding and virtual machine shielding!

Maha Ibrahim | Senior Software Engineer | Microsoft

Update Rollup 10 for System Center 2012 R2 Virtual Machine Manager is now available

$
0
0

Update Rollup 10 for System Center 2012 R2 Virtual Machine Manager (VMM 2012 R2) is now available to download.

For complete details including features added, issues fixed, installation instructions as well as a download link, please see the following:

3147167Update Rollup 10 for System Center 2012 R2 Virtual Machine Manager (https://support.microsoft.com/en-us/kb/3147167)

For information regarding all System Center fixes included in Update Rollup 10, please see the following:

3164172Description of Update Rollup 10 for Microsoft System Center 2012 R2 (https://support.microsoft.com/en-us/kb/3164172)


J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group


Update Rollup 10 for Windows Azure Pack is now available

$
0
0

Update Rollup 10 for Windows Azure Pack (WAP) is now available to download.

Issues that are fixed in this update rollup

  • Issue 1: Windows Server 2016 only: Support for Encryption Supported VMs. Windows Server 2016, Virtual Machine Manager and Service Provider Foundation provide support for Encrypted Supported VMs, now WAP provides support for the three type of VMs in Windows Server 2016: regular VMs, Shielded VMs, and Encryption Supported VMs.
  • Issue 2: Windows Server 2016 only: Fix to incorrect Format of volume Signature in PDK File downloaded through WAP.
  • Issue 3: When a tenant updates a VM Size, the Hardware Profile ID is passed along to the SPF/VMM Virtual Machine Update event, allowing custom runbooks to change other properties as necessary.
  • Issue 4: Fix to Virtual Network property labels in the Quota page. The quotas for “Site-to-Site VPN” and “External IP addresses” labels in the Admin Portal VM Resource Provider are misleading because they read “per network.” They actually are “per subscription.”
  • Issue 5: Fix: When you update the VM Cloud Resource Provider, a duplicate Port setting is added leading ManagementOData to fail and return an error message that reads, “An item with the same key has already been added.”
  • Issue 6: Ability for the tenant user to add a network adapter to a VM while the VM is running. In UR 9.1 and previous versions, new NICs could be added only after the VM was stopped.
  • Issue 7: Ability for the WAP Admin to include a SQL Server into multiple availability groups for HA configurations.
  • Issue 8: Ability for the WAP Admin to include a server that’s running Microsoft SQL Server into multiple availability groups for HA configurations.
  • Issue 9: Ability for the WAP user to enable the “Always On” feature of WAP websites.

For complete details including installation instructions as well as a download link, please see the following:

3158609Update Rollup 10 for Windows Azure Pack (https://support.microsoft.com/en-us/kb/3158609)

For information regarding all System Center fixes included in Update Rollup 10, please see the following:

3164172Description of Update Rollup 10 for Microsoft System Center 2012 R2 (https://support.microsoft.com/en-us/kb/3164172)


J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group

Important update regarding Microsoft Virtual Machine Converter (MVMC)

$
0
0

Today, Microsoft is announcing the upcoming retirement of Microsoft Virtual Machine Converter (MVMC).  This announcement covers all released versions of MVMC (1.0, 2.0, 3.0, 3.1).  Moving forward, we recommend using Azure Recovery Services (ASR) as the tool of choice for migrating your physical and virtual workloads.

Microsoft will continue to support MVMC for a full calendar year after this announcement.  Support will officially end on June  03, 2017.  At that time, we will no longer offer MVMC on the download center and we will also retire associated content.

FAQ:

Q: What is Microsoft’s roadmap for virtual machine conversion utilities?

A: Azure Site Recovery is Microsoft’s standard for converting physical and virtual machines.  We suggest using this tool for physical-to-virtual (P2V), Hyper-V, and VMware conversions to both Azure and on-premises deployments.  We continue to invest in this technology and regularly add capabilities and features.  In addition, Microsoft Virtual Machine Manager (SC 2012 R2 VMM) will continue to support migrations from VMware vCenter deployments to Hyper-V.

Q: Will MVMC remain available?

A: Yes. MVMC will remain a free download until the retirement date next year.

Q: Will there be a other means to obtain the tool after MVMC is retired?

A: No, the download will be removed.  An archive will not be available.

Mark Stanfill, Supportability Program Manager
Microsoft Enterprise Cloud Group

Cumulative Update 2 for System Center 2016 Virtual Machine Manager Technical Preview 5 is now available

$
0
0

Cumulative Update 2 (CU2) for Microsoft System Center 2016 Virtual Machine Manager Technical Preview 5 is now available. There are two updates available for Cumulative Update 2 for System Center 2016 Virtual Machine Manager Technical Preview 5: An update for VMM Server and an update for the Administrator console.

For a complete list of scenarios enabled, issues fixed, known problems as well as download and installation instructions, please see the following:

3160164Cumulative Update 2 for System Center 2016 Virtual Machine Manager Technical Preview 5 (https://support.microsoft.com/en-us/kb/3160164)


J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group

How to prepare a Windows VHD for upload to Microsoft Azure

Now Available: Update Rollup 11 for Microsoft System Center 2012 R2 Virtual Machine Manager

$
0
0

Update Rollup 11 for Microsoft System Center 2012 R2 Virtual Machine Manager is now available. The KB article below describes the issues that are fixed in VMM 2012 R2 Update Rollup 11 (UR11) and there are two updates: One update for VMM Server and one for the Administrator console. Please note that these updates are available only for manual download through the Microsoft Download Center and are not available on Microsoft Update. For additional details regarding the issues fixed as well as download and installation instructions, please see the following:

3184831 – Update Rollup 11 for System Center 2012 R2 Virtual Machine Manager (https://support.microsoft.com/en-us/kb/3184831)


J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group

Microsoft Virtual Machine Manager and support for .NET Framework

$
0
0
Today we’re happy to announce that both .NET Framework 4.6.1 and .NET Framework 4.6.2 are officially supported on servers running Microsoft System Center 2012 R2 Virtual Machine Manager (VMM 2012 R2). We have also validated Windows Management Framework 5.0 (WMF 5.0) with Windows Server 2012 R2 computers so that is supported as well. The official... Read more

Announcing VMM SDN Express for VMM 2016

$
0
0

We are happy to announce the release of VMM SDN Express for Microsoft System Center Virtual Machine Manager 2016 (VMM 2016)! Do you want a VMM solution that can deploy an entire SDN fabric without you having to move through multiple VMM wizards or having to wait for very long? What if you could specify all the parameters in a single file and let VMM take over all the SDN deployment tasks, where you simply come back later and see the complete VMM SDN stack deployed? VMM SDN Express does exactly that, and then some. The successful deployment is completely manageable with the VMM UI post deployment, and failed deployments roll back entirely leaving your fabric ready for another deployment attempt while providing you with the required logs to investigate the causes of failure.

You can find related resources on Github, including the required documentation and example parameter files. There you will find following:

image

The script deploys SDN stack using VMM through a single configuration file.

Apart from reducing points of human error caused by multiple input wizards, the script also saves significant time for fabric admins as they are able to specify all of the parameters at one time and then come back later to a complete SDN stack, including Network Controller, Software Load Balancer and Gateway, all deployed through VMM. Once you deploy SDN using this script, the complete stack is manageable via the VMM UI just as it would if you had deployed SDN using the VMM UI wizards!

So use this script if you want to leverage best of both worlds – SDN Express like agility for deployment and rich management capability using VMM UI afterwards.

This script deploys all the Logical Networks and artifacts as described in the VMM SDN deployment guide. You also have the option to repurpose existing a Management Logical Network and Logical Switch if you already have those configured.

Note that if script suffers a failure due to wrong input or infra issues, all the changed settings are rolled back and you can start a fresh deployment all over again.

Also, please be aware that SET enabled switch deployment is currently not supported in this script. The script finds the first pNIC in Trunk mode on the host and deploys Logical Switch in the standalone mode on the host. In case the script can’t find such a pNIC on any host, the switch deployment will fail. If you need SET enabled deployment, you need to deploy the SET enabled switch out of band and then specify the name of the switch in the script at the time of deployment.

We’re looking forward to hearing about deployments from you guys in case you are planning to deploy SDN in your environment so please share your feedback.


How to recover an HNV Gateway that was deployed through Microsoft VMM 2016

$
0
0

Author: Manish Jha | Program Manager

This post contains information about HNV gateways that are deployed through Microsoft System Center Virtual Machine Manager 2016 (VMM 2016). Please note that with Windows Server 2016 and VMM 2016, you now have an option to use Azure style gateways that are managed by Network Controller. Steps in this guide, however, focus on the HNV style gateways that could be deployed with Windows Server 2012 R2 and VMM 2012 R2 in the past. The 2012 R2 style HNV gateways can be deployed even with Windows Server 2016 and VMM 2016 since this capability is fully compatible with our latest release. Please refer here for more information on gateways.

This post describes two ways of recovering a HNV Gateway:

  • How to recover a gateway after failure of both virtual machines that support the gateway
  • How to recover a gateway after failure of one virtual machine that supports the gateway

How to recover a gateway after failure of both virtual machines that support the gateway

We will assume that you deployed HNV gateway using a VMM Service Template. This service template helps you create a pair of virtual machines on a host cluster, and together the virtual machines and the cluster help provide high availability for the gateway that runs on them.

If both virtual machines that make up the gateway fail, you can recreate the failed gateway by deploying a service template again. When you recreate the gateway, the names of the virtual machines can differ from before, and you can deploy them to a different host cluster. Other settings, such as the subnets that are specified in the network sites, must remain the same as when you originally deployed the gateway. The following procedures provide details.

How to collect information to prepare for gateway recovery after failure of both virtual machines

1. In the Fabric workspace in VMM, select Network Service in the console tree under Networking.

2. In the Network Services pane, find the listing for the gateway that you want to recover and record the name of the gateway. In this article, this name is known as GATEWAY-NAME.

3. Right-click the listing for the gateway and then click Properties.

4. Click Connectivity, then record the information that is displayed for the frontend and the backend (network adapters and network sites).

5. Close the Properties page.

6. Make sure that you downloaded the following Windows PowerShell script:

RecoverGatewayScript.psm1

Note that this script remains unchanged from VMM 2012 R2 usage.

7. Determine the MAC address of the gateway by running the following script commands. Make sure that you substitute the correct path for PATH and the name of the gateway for GATEWAY-NAME.

Import-Module PATH\GatewayRecovery.psm1
$svcName = “GATEWAY-NAME”
$hostCredential = Get-Credential
GetMacAddress $svcName $hostCredential

How to recover after failure of both virtual machines that support the gateway

1. In VMM, delete the service listing for the two virtual machines that supported the failed gateway. To do this, click Show on the Home tab in the VMs and Services workspace, then click Services. Locate the host on which the virtual machines are deployed. In the details pane, right-click the service (not the individual virtual machines), then click Delete. When you are prompted, confirm the deletion.

2. Optionally, if you are using the same virtual machine names that you used before, and you expect that the existing DNS entries will cause problems when you redeploy, arrange to have these DNS entries removed.

3. If you are using a new host cluster instead of recovering the gateway on the existing host cluster, make sure that the new hosts are configured as dedicated network virtualization gateways. To do this, follow these steps:

  • In the Fabric workspace in VMM, make sure that Fabric Resources is selected in Show on the Home tab.
  • In the Fabric pane, click Servers, expand the host group that contains the new host cluster, and then click the host cluster.
  • In the Hosts pane, right-click one of the hosts (not the host cluster), and then click Properties.
  • Click the Host Access tab, and then click to select the This host is a dedicated network virtualization gateway, so it is not available for placement of virtual machines requiring network virtualization check box. Then click OK.
  • Repeat the process on the other host.

4. As you did for the original deployment, choose the appropriate service template (2-NIC or 3-NIC) for your environment. Review the settings in the service template to make sure that they are what you want for this deployment of the gateway.

IMPORTANT When you re-create the gateway, you must specify the same subnets in the network sites that you specified for the gateway that failed. However, the names of the virtual machines can be different, and you can deploy them to a different host cluster.

5. As you did for the original deployment, use the service template to deploy the virtual machines that will support the new gateway. Make sure that you deploy them on the intended hosts.

6. Do the following verification tasks to make sure that the service deployment was successful:

  • Confirm that the back-end virtual network adapter on the gateway is not connected. (It should not be connected yet.) To do this, follow these steps:
    1. In the VMs and Services workspace in VMM, click Services in the Show group on the Home tab.
    2. Expand All Hosts, and then click the host group that the host cluster is in.
    3. In the Services pane, expand the service until you can see the gateway virtual machines.
    4. Right-click a gateway virtual machine, click Properties, and then click the Hardware Configuration tab in the properties sheet.
    5. Under Network Adapters, confirm that there are three network adapters and that one of them is labeled Not connected. Record the name of the adapter that is not connected.
  • Start the new service, and then confirm that the virtual machines enter the Running state.
  • With the virtual machines still running, open a command prompt on the VMM server as an administrator, then type PING, followed by the name or IP address of the gateway itself. Press Enter, then confirm that a response is received from the gateway. If a response is not received, review possible causes, such as DNS settings, firewall settings and the state of the gateway cluster.

7. Choose one of the new virtual machines as “primary.” Run the following Windows PowerShell commands, substituting the name of the chosen virtual machine for VMNAME:

$vm = Get-SCVirtualMachine –Name “VMNAME”
$vm.VirtualNetworkAdapters | ft Name,VMNetwork,VirtualNetwork

8. In the resulting display, look for the adapter that is not connected. For that adapter, VMNetwork and VirtualNetwork will be blank. Identify the number of that adapter as follows:

Adapter Number
First adapter that is shown in the list: 0
Second adapter that is show in the list: 1
Third adapter that is shown in the list: 2

9. Grant the MAC address that you identified in the earlier procedure to the network adapter that is not connected. To do this, run the following Windows PowerShell command. For MACADDRESS, substitute the MAC address, and for NUMBER, substitute the number (0, 1, or 2) that you identified in the previous step:

$mac = Grant-SCMACAddress -MACAddress MACADDRESS -MACAddressPool
(Get-SCMACAddressPool -Name “Default MAC address pool”) -VirtualNetworkAdapter
$vm.VirtualNetworkAdapters[NUMBER]

10. Make sure that the virtual machine is stopped, and then apply the MAC address to the network adapter that is not connected. To do this, run the following Windows PowerShell commands. For NUMBER, substitute the same number (0, 1, or 2) that you used in the previous step:

Stop-SCVirtualMachine –vm $vm
Set-SCVirtualNetworkAdapter -VirtualNetworkAdapter
$vm.VirtualNetworkAdapters[NUMBER] –EthernetAddress $mac.Address

11. Delete the old gateway configuration information so that it will not interfere with the new gateway. To do this, you will need to know the names of the hosts in the cluster that the gateway was on before it failed. (This might be the same cluster that it is currently on.) To do this, follow these steps:

  • In any workspace in VMM, click Window on the Home tab, and then click PowerShell.
  • Run the following commands. For GATEWAY-NAME, substitute the gateway name. For HOST1 and HOST2, substitute the computer names of the physical hosts that were in the host cluster when the gateway failed. Run these commands even if you are using the same cluster you were using before the gateway failed.

$svcName = “GATEWAY-NAME”
$hostCredential = Get-Credential
$gwHosts = @(“HOST1”, “HOST2”)
CleanupGatewaysBeforeMigration $svcName $gwHosts $hostCredential

12. Restart the virtual machine by running the following command:

Start-SCVirtualMachine –vm $vm

13. Update the connection string for the gateway as follows. Do this even if you are using the same host cluster and the same computer names for the virtual machines.

  • Look up the existing connection string by running the following commands:

$ns = Get-SCNetworkService -Name $svcName
$ns.ConnectionString

For example, the connection string might resemble the following:

VMHost=GW-HV-CL01.contoso.com;GatewayVM=GW-VM-CL01.contoso.com;BackendSwitch=DatacenterSwitch

  • Construct an updated version of the connection string by pasting the old string into a text editor such as Notepad and then updating it as follows (make sure that you leave the semicolons as-is).
    1. If the cluster name of the host cluster differs from what it was before, change the VMHost= setting.
    2. If the computer name of the “primary” virtual machine differs from what it was before, change the GatewayVM= setting to the new name.
  • Update the connection string by running the following command. When you run the command, substitute the correct connection string for CONNECTIONSTRING.

Make sure that you include ;Migrate=true at the end of the string inside the quotation marks, and -Force at the end after the last quotation mark.

Set-SCNetworkService -NetworkService $ns -ConnectionString
“CONNECTIONSTRING;Migrate=true” -Force

  • If the Set-SCNetworkService command reports any errors, fix them and run the command again.

14. From a tenant virtual machine that uses the gateway, test the gateway. For example, use a network command such as PING.

How to recover a gateway after failure of one virtual machine that supports the gateway

If one of the virtual machines that support the gateway is functioning correctly but the other is not, you can use capabilities that are built into VMM services to “scale out” the gateway so that it again provides redundancy. To do this, follow these steps:

1. In VMM, remove the virtual machine that no longer functions. To do this, follow these steps:

  • In the VMs and Services workspace, select the host group where you deployed the service that runs the gateway.
  • In the Show group on the Home tab, click Services.
  • In the Services pane, expand the service.
  • Right-click the virtual machine that has failed, and then click Delete.
  • When you are prompted, confirm the deletion.

2. In Failover Cluster Manager, evict the failed node from the guest cluster that supports the gateway. To do this, follow these steps:

  • Open Failover Cluster Manager, expand the cluster in the console tree, expand Nodes, and then look at the status for each node. One node will be Up, and one node will be Down.
  • Right-click the node that has a status of Down, click More Actions, and then click Evict.

3. In the Services pane, right-click the gateway service itself (not a virtual machine), then click Scale Out.

4. On the Select Tier page in the Scale Out Tier Wizard, click Next.

5. On the Identity page, enter a name for the new virtual machine and click Next.

6. On the Select Host page, make sure that you select the host that held the virtual machine that failed, then click Next.

7. If the Configure Settings page appears, enter the computer name for the new virtual machine under Operating System Settings. Make sure that this computer name is not already being used by a computer in your environment.

8. Click Next.

9. On the Add Properties page, click Next.

10. On the Summary page, review your settings, and then click Scale Out.

NOTE You can track the progress of the scale out operation in the Jobs window. The operation can take 15 minutes or longer. You can perform other tasks in the VMM console while you monitor the job.

11. After the Create virtual machine job is completed successfully, verify that the new virtual machine was added and that it is started in the VMs and Services workspace. The new node will probably start to function within about five minutes.

12. To verify that the gateway is functioning, connect to the new virtual machine, and then run Get-NetCompartment at a Windows PowerShell prompt. If multiple compartments are listed, the new virtual machine is functioning and will help provide high availability for the gateway.

Manish Jha | Program Manager | Microsoft

Hotfix 1 for System Center 2016 Virtual Machine Manager Update Rollup 1 is now available

$
0
0

We published a new KB article that describes the fix that’s included in Hotfix 1 for Microsoft System Center 2016 Virtual Machine Manager Update Rollup 1. Additionally, the article contains information about how to obtain the hotfix as well as installation instructions. There are no updates to the Administrator Console or Guest Agent as part of this hotfix, however installation of this hotfix requires you to update the Host agent on all the VMM-managed hosts. Also note that you must have Update Rollup 1 for System Center 2016 Virtual Machine Manager installed to apply this hotfix.

For complete details please see the following:

3208888Hotfix 1 for System Center 2016 Virtual Machine Manager Update Rollup 1 (https://support.microsoft.com/en-us/kb/3208888)

J.C. Hornbeck, Solution Asset PM
Microsoft Enterprise Cloud Group

VMM 2016 UR1

Troubleshooting ‘Unsupported Cluster Configuration’ errors in Virtual Machine Manager 2012 R2

$
0
0

~ John Clyburn | Senior Consultant

Hi everyone, my name is John Clyburn and I’m a senior consultant here at Microsoft. I was recently working at a customer site where we were getting “Unsupported Cluster Configuration” errors in the SCVMM console for VMs in a Hyper-V cluster so I thought I’d take a minute today to discuss what we did in the hopes that it might help you if you run into a similar situation. There can be many different symptoms and resolutions for a problem like this so just be aware that what I describe here is specific to my particular scenario. 

In this case, all of the VMs were still online and running without issue, I could log on to the VMs, and there were no service interruptions to the services running on the VMs. The customer had the following configuration:

  • SCVMM 2012 R2 UR11 (Clustered).
  • Two Windows Server 2012 Hyper-V (Clustered) for hosts.
  • CSV and SOFS shares for storing virtual machines setup via SCVMM.

Several of the virtual machines displayed the following error in the VMM console under the status column:

Unsupported Cluster Configuration

In SCVMM, when we would right- click the VM and select Properties –> Status, we saw this error:

Error (13924) The highly available virtual machine (VMNAME) is not supported by VMM because the virtual machine uses non-clustered storage.

As stated earlier, there can be many different causes for the Unsupported Cluster Configuration error, however in my particular case it was caused by a misconfiguration of the storage and property path settings on the VMs. When using a cluster, all of the VM storage properties settings must be stored on highly available storage like a cluster shared volume, and in my case not all of the VMs storage properties were being placed on a highly available storage.

For an example of the same error being caused by a network misconfiguration, here’s an article written by Microsoft’s own Chuck Timon that documents how he approached and resolved the same error:

https://blogs.technet.microsoft.com/scvmm/2013/09/10/working-through-an-unsupported-cluster-configuration-scenario-in-virtual-machine-manager/

The solution below demonstrates how to correct the Unsupported Cluster Configuration error caused by a misconfiguration of the storage and property path settings on a VM that is stored on a cluster volume. If the VM storage and property path is not pointing to folders that are highly available, you will receive the unsupported cluster configuration error. Follow the steps below to correct it.

In the Scenario below, I will use the following names in the example solution:

  • Failed VM Name: SRV-FAILED-01
  • VMM computer Name: SRV-VMM-01
  • VMM Cluster Name: VMM01
  • VM storage path on servers: CSV installation uses C:\ClusterStorage\Volume1\VM_1 and SOFS installation uses \\SRV-SOFS-01.CONTOSO.LOCAL\MGMT-VHD1

Resolution Steps:

1. On the VMM server open an administrative Virtual Machine Manager Command Shell and run Get-VMMServer. For the computer name use SRV-VMM-01, or for a cluster, use the cluster name of VMM01. Click Enter.

2. In VMM PowerShell, run Get-SCVirtualMachine -Name <SRV-FAILED-01> | FL * and check to see if any of the following paths are not on HA storage such as a cluster CSV volume:

  • VMCPath
  • CheckPointLocation
  • Location

Note that the only way to see the above info is by using PowerShell. You will not see them in the properties of the VM.

3. If any of the paths point to local storage on the Hyper-V system then this is the problem. An example would be if it’s listed as C:\ProgramData\Microsoft\Windows\Hyper-V. This path will cause the error.

4. Record the following settings from the VM:

  • Network settings
  • IP Number
  • All drives VHDX file path
  • VM Generation

5. Shutdown the VM. Optionally but recommended, export the VM in Hyper-V to the local file system for a backup.

6. If the VM is displayed in Failover Cluster Manager (FCM), launch FCM and navigate to <HYPERVClusterName>, then right-click the VM and select Remove.

7. Delete the VM (SRV-FAILED-01) from Hyper-V. Note that we’ll have to delete the VM and recreate it but DO NOT DELETE IT IN SCVMM because SCVMM will delete all the files and we do not want that. Delete it in Hyper-V Manager by going to the Hyper-V manager console on the node that owns the VM, right-clicking the VM and selecting Delete. This will leave the VMs folder with all the VHDX files in it.

8. In SCVMM, the VM should now show as ‘Missing’. However, even if it does not, open PowerShell in VMM and run Get-SCVirtualMachine -Name <SRV-FAILED-01> | FL *. If you get data back, arrow up (to run the command again), but make the command look like this:

Get-SCVirtualMachine -Name <SRV-FAILED-01> | Remove-SCVirtualMachine -Force

The VM should now be gone in the VMM console.

9. Now, in Failover Cluster Manager, right-click Roles –> Virtual Machines –> New Virtual Machine.

10. On the Select the Target cluster node page, select the same Hyper-V host and click OK.

11. On the Specify Name and Location page, specify the following:

  • Name: <SRV-FAILED-01>. Note that you should use the same VM name.
  • Select Store the Virtual Machine in different locations and use <C:\ClusterStorage\Volume1\VM_1>, or <\\SRV-SOFS-01.CONTOSO.LOCAL\MGMT-VHD1\. Just make sure that the disk path is on HA Storage.

Click Next.

12. On the Specify Generation page, select the appropriate generation.

13. On the Assign Memory page, set the memory.

14. On the Configure Networking page, set the networking.

15. On the Connect Virtual Hard Disk page, add the VM using the existing VM VHDX file. It’s important that you do not create a new disk. Navigate to the existing OS VM disk and add it, using either C:\ClusterStorage\Volume1\VM_1\<SRV-FAILED-01.vhdx> or \\SRV-SOFS-01.CONTOSO.LOCAL\MGMT-VHD1\SRV-VMM-01\SRV-FAILED-01.vhdx>.

Click Next.

16. On the Summary page, click Finish, then on the second Summary page click Finish again.

IMPORTANT: DO NOT START THE VM YET.

17. Add the Shared VHDX file to the VM.

18. Edit the VM by right-clicking it and selecting Settings. Navigate to SCSI Controller, highlight Hard Drive and click Add. In the Virtual Hard Disk box type the path to the existing shared VHDX file. This will be either C:\ClusterStorage\Volume1\SHAREDVHDX\VMMWitness.vhdx or \\SRV-SOFS-01.CONTOSO.LOCAL\MGMT-VHD1\SHAREDVHDX\VMMWitness.vhdx>

DO NOT CLICK APPLY YET!

19. Expand Advanced Features and select Enable virtual hard disk sharing, then click Apply.

20. Confirm that the Checkpoint File Location and the Smart Paging File Location is pointing to the CSV or SOFS share and not a local folder on the Hyper-V host. This would be C:\ClusterStorage\Volume1\VM_1\<SRV-FAILED-01> or \\SRV-SOFS-01.CONTOSO.LOCAL\MGMT-VHD1\SRV-FAILED-01\. If it doesn’t then the VM will not be able to migrate between the Hyper-V cluster nodes.

21. Under Network Adapter, set the appropriate Virtual Switch and click OK to save the settings.

22. Start the VM in failover manager, then connect to the VM and login.

23. Set the VMs IP number.

At this point the VM should now be able to migrate in failover cluster manager and VMM.

Test the migration to verify.

Once complete, you should no longer see the “Unsupported Cluster Configuration” errors in the SCVMM console.

John Clyburn | Senior Consultant | Microsoft

VMM 2012 R2 VMM 2016

System Center Virtual Machine Manager 2007 version nearing end of support

$
0
0

Product support for Microsoft System Center Virtual Machine Manager 2007 will reach its end of support date in 12 months. If you are using this version, please upgrade to a newer version before January 9, 2018 to ensure supportability.

The following resources are available to help you upgrade to the latest version of Virtual Machine Manager:

Have questions about supported products? Visit Microsoft Support Lifecycle to view a list of supported products and related policies.

System Center VMM 2016 features demos on Channel 9

$
0
0

We now have some quick demos (<5 minutes) published on Channel 9 which provide you with good insights of new features of Virtual Machine Manager 2016. They’re definitely worth checking out and you can find complete list below.

  • Deploy Network Controller: In this video tutorial you will see how you can use the service template-based mechanism, provided by VMM 2016, for deployment and horizontal scaling of Software Defined Networking components – Network Controller, Gateway, and Software Load Balancer. Network Controller is a new server role in Windows Server 2016 that provides a centralized and programmable point to automate network configuration.
  • Setup hyper-converged cluster: In this video, you will see how you can use VMM 2016 to seamlessly deploy hyper-converged Storage Spaces Direct cluster that provide highly available and scalable storage solutions using local disks. You will see how the existing cluster creation wizard is extended to deploy hyper-converged clusters by simply checking a check box.
  • Create & set Port ACLs: In this video tutorial, you will see the how Port ACLs help you control the network traffic going in/out of your datacenter and will learn how you can create and set Port ACLs in VMM 2016. Port ACL serves as a collection of access control entries or ACL rules. An ACL can be attached to any number (zero or more) of VMM networking primitives, such as a VM network, VM subnet, virtual network adapter, or the VMM management server itself. An ACL can contain any number (zero or more) of ACL rules. Each compatible VMM networking primitive (VM network, VM subnet, virtual network adapter, or VMM management server) can have either one port ACL attached or none.
  • Cluster Rolling Upgrade: Using Cluster Rolling Upgrade functionality in SCVMM 2016, you can now upgrade your Windows Server 2012 R2 clusters to Windows Server 2016 clusters with no downtime to running workloads. Watch this video to learn about the pre-requisites and the see how VMM automates the entire process of upgrading the nodes in the cluster.
  • Increase memory of a running VM: With VMM 2016, you can now modify the memory configuration of a running VM that uses static memory. This functionality helps in eliminating downtime to running workloads due to memory reconfiguration. You can increase or decrease the memory allocation, or switch the virtual machine to dynamic memory. Watch this video to see how it can be done in VMM 2016.
  • Create & set Storage QoS: With VMM 2016 you can set the quality of service (min or max IOPS, max bandwidth) for virtual machine storage so that applications running on the VMs receive the performance they require. This video tutorial provides a walkthrough of how you can create & set Storage Quality of Service policies in VMM 2016 which help you avoid noisy neighbor problems in your workloads.
  • Bare Metal Deployment of Nano Server: With System Center 2016 Virtual Machine Manager you can now provision bare metal machines to Nano Server-based hosts/clusters. The Nano Server-based operating system deployment is very similar to a Full Server deployment. Watch this video tutorial to learn how you can do it in VMM 2016.
  • Creating a Shielded VM using System Center 2016 Virtual Machine Manager (VMM): In this video, you will see the new Shielded VM feature. You can see how to create a shielded using System Center 2016 Virtual Machine Manager (VMM) and how data at rest or in transit, cannot be snooped or tampered by malicious fabric admins.

Ashish Mehndi | Senior Program Manager | Microsoft

Viewing all 46 articles
Browse latest View live




Latest Images