Nuffnang
Sunday, August 28, 2011
vMotion fails with the error: problem detected at CPUID level 0x80000001 register 'edx'
vMotion fails
You see the error:
Unable to migrate from : The CPU of the host is incompatible with the cpu feature requirements of virtual machine; problem detected at CPUID level 0x80000001 register 'edx'
Solution
This issue is caused by the Nx flag setting.
There are 2 options to correct this:
In VMware Infrastructure (VI) Client, select the virtual machine from the Inventory. Click Edit Settings > Options > Advanced > Hide the Nx flag from the guest.
Note: The virtual machine needs to be powered off for the change to take effect.
Check /proc/cpuinfo on both hosts and verify the Flags column is identical. In this case "nx" was missing. Go into the BIOS of each host and enable the setting called no-execute memory protection on both hosts or turn this off on both hosts.
For more information, see Ensuring Virtualization Technology is enabled on your VMware host (1003944).
Note: Execute Protection is Intel eXecute Disable (XD) on Intel processors and AMD No eXecute (NX) on AMD processors.
Monday, August 22, 2011
Why Virtualization Services?
• Operational scalability
• Rapid deployment of applications
• Efficient use of server resources
• High availability
• Customer control
Service Models
Cloud Infrastructure as a Service (IaaS)
The capability provided to the consumer is to provision processing, storage, networks, and
other fundamental computing resources where the consumer is able to deploy and run
arbitrary software, which can include operating systems and applications. The consumer
does not manage or control the underlying cloud infrastructure but has control over
operating systems, storage, deployed applications, and possibly limited control of select
networking components (e.g., host firewalls).
Cloud Platform as a Service (PaaS)
The capability provided to the consumer is to deploy onto the cloud infrastructure consumercreated
or acquired applications created using programming languages and tools supported
by the provider. The consumer does not manage or control the underlying cloud
infrastructure including network, servers, operating systems, or storage, but has control over
the deployed applications and possibly application hosting environment configurations.
Cloud Software as a Service (SaaS)
The capability provided to the consumer is to use the provider’s applications running on a
cloud infrastructure. The applications are accessible from various client devices through a
thin client interface such as a web browser (e.g., web-based email). The consumer does not
manage or control the underlying cloud infrastructure including network, servers, operating
systems, storage, or even individual application capabilities, with the possible exception of
limited user-specific application configuration settings.
Sunday, August 7, 2011
Outsourcing the Groupware Layer - Email Application
Overview
• Off-site hosting of groupware systems and mail stores (Exchange, POP/IMAP, etc.)
• The filtering layer is almost always outsourced before the groupware layer. This can be done with the same or different cloud provider.
Critical Things to Consider
Important questions to consider before outsourcing this layer to the cloud include:
• Does your business have enterprise message routing requirements? Most large organizations have fairly complex routing requirements that are difficult to implement and manage if your groupware system is hosted. For example, many enterprises, especially those with multiple domains, often have complex ‘message manipulation’ requirements. These include things such as address header rewriting before delivering messages. They have enterprise routing requirements that must rely on sensitive Directory attributes to enforce. This level of message header manipulation and intelligent routing is difficult to implement in the cloud. In these cases an external gateway and/or an on-premises email backbone policy layer is always required; however, even then, message traffic between your organization and the cloud provider will increase substantially.
• Does your organization require sending of large messages and attachments that you know of? Even the large cloud providers such as Google have restrictions on the size of messages that it will handle. For example, pharmaceutical companies require the sending of very large messages.
• Does your company have strict archiving policies? Most enterprises, especially those that are highly regulated, have strict email archiving policies that are difficult to implement in the cloud. For example, financial services firms require that all email destined “outside the company” must be retained and messages between certain internal departments be archived. To accomplish this, LDAP attributes must be used to determine the correct policy on any given message. Is your company willing to give sensitive LDAP information to an external public cloud provider?
• Do you want potentially legal or damaging email to be archived, or even sitting in your end-users inbox, outside the control of your organization?
• Does your company have strict data retention policies? In the cloud, organizations lose control of data retention. While there may be options to make the data inaccessible to the customer after the retention policy, there is no control as to when the data is actually removed from all potential locations (databases, backups, logs, etc.). This can apply to messaging data as well as metadata such as logs.
• What level of trust will you have with your cloud provider? While an organization may trust their cloud provider, they may not know about other third-party partners of that provider. For example, cloud providers may use external storage or back-up providers. You should be aware of any partnerships at the time you establish a contract with the cloud provider, and you should be notified of any new partnerships during the duration of your contract.
• What about confidentiality? With the potential loss of encryption capabilities with cloud services, all data flowing through the provider can be reviewed by the provider or possibly their business partners.
Conclusion and Recommendations
• Enterprises have complex policy and email handling requirements that have proven to be problematic to implement and enforce in the cloud.
• To effectively enforce email policies, enterprises will need to give up certain aspects of the messaging security and policy handling that they currently have with their on-premises solutions. More often than not, this is an unacceptable proposition.
• In order to satisfy enterprise-level message policy and handling requirements, an on-premises external gateway and/or an on-premises email backbone policy layer is almost always required. If this is the case for your organization, and you outsource the groupware layer, this effectively means that the cloud provider is only hosting your message store.
Thursday, August 4, 2011
RedHat KVM vs Vsphere vs Microsoft Hyper-V
Features
| Red Hat Enterprise Virtualization for Servers | VMware vSphere 4.0
| Microsoft Hyper-V 2008 R2 |
Bare metal hypervisor: A bare metal hypervisor is one that installs directly on the server hardware without requiring a full operating system.
Red Hat Enterprise Virtualization leverages the modularity of Red Hat Enterprise Linux to provide hypervisor functionality without requiring a monolithic operating system to reside on. | Yes | Yes | Server Core and Hyper-V Server 2008 R2 installations are minimum 3 GB disk space.
|
Small footprint: The Red Hat Enterprise Virtualization hypervisor is <100MB, suitable for installation on local flash storage, boot from SAN, or PXE booting for diskless hosts. | Yes | Yes | No |
Security: Only Red Hat Enterprise Virtualization leverages open source, enterprise-grade security developed in partnership with government agencies for high security. Red Hat Enterprise Virtualization uses the SELinux standard for security and is backed by Red Hat Network for security updates. | Yes | No | No |
CPU virtualization: Red Hat Enterprise Virtualization-H is able to virtualize up to 256 logical CPUs (combination of cores and hyperthreading) on each host for resentation to virtual machines. Each VM can use up to 16 vCPUs for maximum efficiency. | Maximum 256 vCPUs per host. 256 logical CPUs per host. 16 vCPUs per VM.
| Maximum 512 vCPUs per host. 64 logical CPUs per host. 8 vCPUs per VM
| Maximum 64 vCPUs per host. 64 logical CPUsper host. 8 vCPUs per VM |
Memory over commitment: Red Hat Enterprise Virtualization can allocate more virtual memory to its VMs than the host has physical memory. | Yes | Yes | No |
Page sharing: Memory page sharing allows VMs with like operating systems to share physical memory to store redundant memory pages. | Yes | Yes | No |
Processor hardware memory assist: Reduces the time required to exchange memory resources between the host and the virtual machine using the latest x86 processors. | Yes | Yes | No |
Virtual NIC s: The hypervisor can present to each virtual machine multiple virtual network interface cards, each of which can map to different virtual networks and physical NICs on the host machine. | 8 per guest
| 10 per guest | Max of 8 “internal” NICS for VM to VM traffic, 4 “external” NICS for connection to rest of Network |
vLAN s: Support for virtual LANs on the virtual NICs inside the virtual infrastructure. | Yes | Yes | Requires Host OS and VM OS configuration |
Network offload: Reduces CPU resources needed to process virtual networking and network IO by offloading to compatible NIC hardware. | Yes | Yes | Yes |
Guest operating systems | Supports Windows 2003, 2008, XP, and Red Hat Enterprise Linux 3, 4, 5+ | Support for most x86 operating systems, including Windows, Linux, UNIX | Windows 2003, 2008 (certain SPs only), Red Hat Enterprise Linux 5+ only |
Intelligent failover: Red Hat Enterprise Virtualization high availability ensures that high priority virtual machines are automatically restarted on failure of the VM itself or the host on which it resides. | Yes | Requires Advanced or higher | Requires Windows Clustering |
Maintenance mode: Red Hat Enterprise Virtualization hosts undergoing maintenance automatically have their guest VMs migrated to other available hosts and are removed as targets for migration until maintenance is complete. | Yes | Yes | No |
Shared resource pools: Pools of resources such as CPU, memory, and storage are aggregated and managed at the datacenter or cluster level rather than machine-bymachine. | Yes | Yes | No |
Cluster resource policies: Red Hat Enterprise Virtualization allows administrators to set cluster policies for resource smoothing. | Yes | Enterprise and Enterprise Plus only (DRS) | No |
Shared storage: Red Hat Enterprise Virtualization can use NFS, iSCSI, and Fibre Channel shared storage for the storage of virtual machines. | Yes | Yes | Limited |
VM snapshots: Red Hat Enterprise Virtualization virtual machine snapshots allow administrators to apply patches and upgrades in a transactional way and roll back to a known good snapshot if the patch runs into an issue. | Yes | Yes | Yes |
Storage multipathing | Yes | Yes | Yes |
Virtual disk files: Virtual disks are stored as disk files on the various storage domains. | Yes | Yes | Yes |
Storage virtualization: Red Hat Enterprise Virtualization aggregates and distributes storage resources to maximize flexibility and utilization. | Yes | Yes | Yes |
Application programming interface (API ) | Yes | Yes | yes |
Logging: Red Hat Enterprise Virtualization Manager provides extensive logging for troubleshooting and research. | Yes | Yes | Yes |
PXE boot support: Red Hat Enterprise Virtualization Manager supports PXE boot for network installation of virtual machines. | Yes | Yes | Yes |
Active directory integration: Red Hat Enterprise Virtualization Manager interfaces with your existing Microsoft Active Directory for user access and authentication. | Yes | Yes | Yes |
Access control: Administrative and user access to your virtual datacenter can be controlled and managed from Red Hat Enterprise Virtualization Manager. | Yes | Yes | Yes |
Remote console: Red Hat Enterprise Virtualization Manager allows console access to virtual machines using secure VNC or desktop optimized SPICE remote desktop technology. | Yes | Yes | Yes |
System monitoring: System status can be monitored from Red Hat Enterprise Virtualization Manager. | Yes | Yes | Requires SCOM |
Alerts and notifications: Red Hat Enterprise Virtualization Manager can report errors and warnings to administrators via email. | Yes | Yes | Yes |
Central control and visibility: Red Hat Enterprise virtualization Manager is your single-view Management GUI for your entire enterprise virtualization infrastructure. | Yes | Yes | Requires multiple products to fully manage |
Thin provisioning: Allows the creation of virtual machines with virtual disks that do not take up all of their allowed space upon creation. This allows better use of storage resources as needed. | Yes | Yes | Yes |