How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When...

12
TECHNICAL BRIEF The Easy Way to Ensure Uptime for Your Critical Applications and Dependent Infrastructure Written by Ben Scheerer Quest Server Virtualization Group Quest Software Inc. How to Virtualize with Confidence

Transcript of How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When...

Page 1: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

TECHNICAL BRIEF

The Easy Way to Ensure Uptime for Your Critical Applications and Dependent Infrastructure

Written by

Ben ScheererQuest Server Virtualization Group

Quest Software Inc.

How to Virtualize with Confidence

Page 2: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 2

Contents Introduction .................................................................................................................................................................... 3

How to Virtualize With Confidence ................................................................................................................................. 4

Challenges of Virtualizing Critical Infrastructure ......................................................................................................... 4

Visibility for Accurately and Quickly Resolving Performance Issues………………………………………………..…….5

From Detection to Diagnosis and Resolution……………………………………………………………………………..….9

Conclusion………………………………………………………………………………………………………………………...10

About the Author…………………………………………………………………………………………………………………. 11

Page 3: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 3

Introduction Many organizations are successfully virtualizing and consolidating the “low-hanging fruit” such as file/print servers,

non-critical applications and the like. As virtualized workloads continue their upward trend, the next steps are almost

quantum leaps. The leaps are commonly made into both critical infrastructure (e.g., Microsoft Active Directory) and

tier 1 packaged applications (e.g., Microsoft Exchange).

What makes these leaps? Primarily it’s because so many organizations are ill-prepared or poorly equipped with the

tools and/or processes to manage availability and uptime deep into the layers of critical application infrastructure.

Problems worsen when organizations must deal with the complexity of mixed physical/virtual implementations in

which only partial components are virtualized, while others still reside on physical servers.

As you continue to virtualize more and more of this critical infrastructure, you want to be 100 percent sure you can

deliver the performance and uptime your stakeholders expect. The key to gaining confidence is proper monitoring

and management of your entire environment -- and that means reducing risk and increasing efficiency. In this

technical brief, we’ll discuss the challenges you’ll face in doing so. You’ll also learn what you need to overcome the

challenges, and how one powerful solution provides the most extensive set of capabilities on the market, yet is easy

to use. You will learn to worry less and less about keeping your users happy and maintaining availability.

Page 4: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 4

How to Virtualize With Confidence

Challenges of Virtualizing Critical Infrastructure

When organizations virtualize critical infrastructure components, such as Microsoft Active Directory (AD), they face

new and unique challenges. Typically, administration of AD proves more difficult than expected because of the

difficulties of identifying and understanding the demands of replication, performance and availability. These difficulties

are compounded when AD resides in a mixed physical/virtual environment. That’s because administrators must

pinpoint precisely where problems reside—are they in the underlying infrastructure (physical or virtual), or within

virtualization technology itself? The search for answers compels administrators to address the following:

Understanding the AD component relationships between forests, domains, sites and other infrastructure in

mixed physical/virtual environments

Detecting, diagnosing and resolving performance and availability issues affecting AD and underlying

infrastructure

Communicating state- and service-quality information to stakeholders

The same difficulties surface when virtualizing into tier 1 applications (e.g., Microsoft Exchange). With Exchange,

administrators must manage across both physical and virtual boundaries, as well as accurately identify and

understand the causes of performance and availability issues. Exchange also poses unique difficulties in exposing

state and health information in relation to virtual environments.

Current management tools may fall short in supporting needs such as:

Understanding the relationships and interactions between Exchange application components (roles, servers

and sites) plus supporting infrastructure

Detecting, diagnosing and resolving performance and availability problems specific to the Exchange

application environment

Communicating state- and service-quality information to stakeholders efficiently and thoroughly

Page 5: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 5

Visibility for Accurately and Quickly Resolving Performance Issues The inherent risk in virtualizing critical tier 1 applications and infrastructure lies in both ensuring and communicating

the vital state and heath information of the virtual and physical infrastructures. To do so, organizations must adopt a

solution that is not only virtual-aware, but also virtual-exploitive. This solution should deliver capabilities for

diagnosing, detecting and resolving issues in the virtual and physical infrastructures side-by-side

Furthermore, accurate diagnosis must allow a drill-down into the root cause of issues in the infrastructure. For

example, if the Exchange e-mail service is experiencing delays related to a memory problem, the best approach

would be: first, to identify the locations of the components where problems exist (in both virtual or physical

environments); then, if the problem is in the virtual infrastructure, administrators must be able to drill down to find it

quickly, as well as obtain details about the alerts and visual presentation of the situation (for example, high CPU-

ready values on the VMware ESX server). Finally, administrators must be able to access either guidance on how to

resolve the problem, or launch an in-context automated workflow to correct it. Figure 1 shows ideal visibility of the

virtualized Exchange Server (virtualized state indicated by the blue tag in lower left corner of server icon), as well as a

quick view of the health of the supporting four core resources and the common monitoring components:

CPU

Memory

Network

Storage

Exchange Domain Controller Connectivity

Figure 1 also shows a dashboard that provides extensive visibility into resources highlighted by spinners,

send/receive and read/write motion indicators that change color on overall consumption or deviation from normal

values. This allows administrators to quickly detect, diagnose and resolve problems.

Page 6: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 6

Figure 1: vFoglight provides extensive visibility into the virtualized state and health of Exchange

Visibility must not only extend deeply into the AD and Exchange virtual and physical layers, but it must also be able to

reveal the information required for successfully managing the environment across the virtualized layer and within the

critical application infrastructure. For AD, visibility and analysis of key components—including forests, domains, sites

and domain controllers—must encompass both broad and granular data. With Exchange, key components to monitor

include roles, servers and sites. Figure 2 presents a “perspectives” view that includes data on critical components of

AD and Exchange in both VMware and Windows environments.

Page 7: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 7

Figure 2: This “perspectives” view provides insight of AD and Exchange components in both physical and virtual

environments.

With the data provided in Figure 2, administrators can get a quick assessment of the current state of the

environments. They can conduct further investigations into issues using color-coded symbols, which lead them to

problem areas. By clicking the “Explore” button, they can drill down to details. Figure 3 shows an example of a drill-

down into the data for two virtual servers hosting domain controllers in a caution state.

Page 8: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 8

Figure 3: Presentation of detailed data on health of AD and its associated components after administrators drill down

through the interface.

From Detection to Diagnosis and Resolution Visual cues, along with essential alerts and reports, provide a clear understanding of the health of both virtual and

physical environments. These capabilities guide administrators to accurately diagnose problems and fix them quickly.

This level of management must provide:

Visibility through logical and architectural representations of the AD and Exchange state and relationships,

including associations to the physical and virtual infrastructure

Out-of-the-box alerts, with expert advice, to help administrators reduce mean time to resolution (MTTR) for

incidents and problems affecting AD and Exchange performance and availability

Service-level performance and availability reports to show how AD and Exchange infrastructure is

supporting the business

An effective solution must help administrators accurately identify the root cause of issues and resolve them quickly.

Moreover, the solution must provide views that show data about the critical infrastructure and applications from the

operating system to the hypervisor (if applicable).

Page 9: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 9

Conclusion Success in server virtualization depends on innovative performance-management technologies and practices.

Examining the virtualization layer in depth with a solution specifically designed for managing virtualized environments

from the ground up is essential.

When virtualizing AD and Exchange environments, the solution must be built to manage and monitor performance

across the multiple, diverse components in both physical and virtual environments. The ability to detect, diagnose and

resolve issues related to their interdependent components is also necessary.

Quest® vFoglight®, along with the Foglight® for Active Directory and Foglight® for Exchange cartridges provide the

capabilities for managing the entire infrastructure with greater efficiency and less risk. They allow administrators to

detect, diagnose and resolve problems affecting AD and Exchange -- as well as related components -- for both virtual

and physical environments. With vFoglight, administrators can visualize the AD and Exchange state and relationships

through logical and architectural representations. They can also use out-of-the-box alerts and built-in, expert advice

to maintain performance and availability. Service level agreement reports show how effective management of the

environment supports the business.

Page 10: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 10

About the Author Ben manages product marketing for the Quest vFoglight virtualization monitoring solutions. His 18 years of industry

experience includes CA, Inc. and Vizioncore (which Quest acquired). Ben has served in a variety of roles, including

software sales and as consultant for product and solutions marketing. He speaks frequently at industry events and

has published a host of articles and white papers on IT management topics. Ben holds a master’s degree in

computer information systems from the University of Denver as well as a bachelor’s degree in marketing from

Western Michigan University. He is ITIL® V3 Foundation-certified.

Page 11: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

How to Virtualize With Confidence 11

© 2010 Quest Software, Inc.

ALL RIGHTS RESERVED.

This document contains proprietary information protected by copyright. No part of this document may be reproduced

or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any

purpose without the written permission of Quest Software, Inc. (“Quest”).

The information in this document is provided in connection with Quest products. No license, express or implied, by

estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of

Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE

LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND

DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS

INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A

PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY

DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING,

WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF

INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS

BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with

respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to

specifications and product descriptions at any time without notice. Quest does not make any commitment to update

the information contained in this document.

If you have any questions regarding your potential use of this material, contact:

Quest Software World Headquarters

LEGAL Dept

5 Polaris Way

Aliso Viejo, CA 92656

www.quest.com

email: [email protected]

Refer to our Web site for regional and international office information.

Trademarks

Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure,

Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight,

ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer,

DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile,

InTrust, Invirtus, iToken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats,

Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!,

PowerGUI, Quest Central, Quest vToolkit, Quest vWorkSpace, ReportADmin, RestoreADmin, ScriptLogic, Security

Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab,

Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vAutomator, vControl,

vConverter, vFoglight, vOptimizer, vRanger, Vintela, Virtual DBA, VizionCore, Vizioncore vAutomation Suite,

Vizioncore vBackup, Vizioncore vEssentials, Vizioncore vMigrator, Vizioncore vReplicator, WebDefender, Webthority,

Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America

and other countries. Other trademarks and registered trademarks used in this guide are property of their respective

owners.

Updated—[MONTH, YEAR]

Page 12: How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When organizations virtualize critical infrastructure components, such as Microsoft

5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | E-MAIL [email protected]

If you are located outside North America, you can find local office information on our Web site.

TECHNICAL BRIEF

About Quest Software, Inc.

Quest simplifies and reduces the cost of managing IT for more than 100,000 customers

worldwide. Our innovative solutions make solving the toughest IT management problems

easier, enabling customers to save time and money across physical, virtual and cloud

environments. For more information about Quest go to www.quest.com.

Contacting Quest Software

PHONE 800.306.9329 (United States and Canada)

If you are located outside North America, you can find your

local office information on our Web site.

E-MAIL [email protected]

MAIL Quest Software, Inc.

World Headquarters

5 Polaris Way

Aliso Viejo, CA 92656

USA

Contacting Quest Support

Quest Support is available to customers who have a trial version of a Quest product or who

have purchased a commercial version and have a valid maintenance contract.

Quest Support provides around-the-clock coverage with SupportLink, our Web self-service.

Visit SupportLink at https://support.quest.com.

SupportLink gives users of Quest Software products the ability to:

• Search Quest’s online Knowledgebase

• Download the latest releases, documentation, and patches for Quest products

• Log support cases

• Manage existing support cases

View the Global Support Guide for a detailed explanation of support programs, online services,

contact information, and policies and procedures.

© 2010 Quest Software, Inc. ALL RIGHTS RESERVED.

Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBD-VirtWithConfidence-US-EH20101109