How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When...
Transcript of How to Virtualize with Confidencehosteddocs.ittoolbox.com/questvirtualizewithconfidence.pdf · When...
TECHNICAL BRIEF
The Easy Way to Ensure Uptime for Your Critical Applications and Dependent Infrastructure
Written by
Ben ScheererQuest Server Virtualization Group
Quest Software Inc.
How to Virtualize with Confidence
How to Virtualize With Confidence 2
Contents Introduction .................................................................................................................................................................... 3
How to Virtualize With Confidence ................................................................................................................................. 4
Challenges of Virtualizing Critical Infrastructure ......................................................................................................... 4
Visibility for Accurately and Quickly Resolving Performance Issues………………………………………………..…….5
From Detection to Diagnosis and Resolution……………………………………………………………………………..….9
Conclusion………………………………………………………………………………………………………………………...10
About the Author…………………………………………………………………………………………………………………. 11
How to Virtualize With Confidence 3
Introduction Many organizations are successfully virtualizing and consolidating the “low-hanging fruit” such as file/print servers,
non-critical applications and the like. As virtualized workloads continue their upward trend, the next steps are almost
quantum leaps. The leaps are commonly made into both critical infrastructure (e.g., Microsoft Active Directory) and
tier 1 packaged applications (e.g., Microsoft Exchange).
What makes these leaps? Primarily it’s because so many organizations are ill-prepared or poorly equipped with the
tools and/or processes to manage availability and uptime deep into the layers of critical application infrastructure.
Problems worsen when organizations must deal with the complexity of mixed physical/virtual implementations in
which only partial components are virtualized, while others still reside on physical servers.
As you continue to virtualize more and more of this critical infrastructure, you want to be 100 percent sure you can
deliver the performance and uptime your stakeholders expect. The key to gaining confidence is proper monitoring
and management of your entire environment -- and that means reducing risk and increasing efficiency. In this
technical brief, we’ll discuss the challenges you’ll face in doing so. You’ll also learn what you need to overcome the
challenges, and how one powerful solution provides the most extensive set of capabilities on the market, yet is easy
to use. You will learn to worry less and less about keeping your users happy and maintaining availability.
How to Virtualize With Confidence 4
How to Virtualize With Confidence
Challenges of Virtualizing Critical Infrastructure
When organizations virtualize critical infrastructure components, such as Microsoft Active Directory (AD), they face
new and unique challenges. Typically, administration of AD proves more difficult than expected because of the
difficulties of identifying and understanding the demands of replication, performance and availability. These difficulties
are compounded when AD resides in a mixed physical/virtual environment. That’s because administrators must
pinpoint precisely where problems reside—are they in the underlying infrastructure (physical or virtual), or within
virtualization technology itself? The search for answers compels administrators to address the following:
Understanding the AD component relationships between forests, domains, sites and other infrastructure in
mixed physical/virtual environments
Detecting, diagnosing and resolving performance and availability issues affecting AD and underlying
infrastructure
Communicating state- and service-quality information to stakeholders
The same difficulties surface when virtualizing into tier 1 applications (e.g., Microsoft Exchange). With Exchange,
administrators must manage across both physical and virtual boundaries, as well as accurately identify and
understand the causes of performance and availability issues. Exchange also poses unique difficulties in exposing
state and health information in relation to virtual environments.
Current management tools may fall short in supporting needs such as:
Understanding the relationships and interactions between Exchange application components (roles, servers
and sites) plus supporting infrastructure
Detecting, diagnosing and resolving performance and availability problems specific to the Exchange
application environment
Communicating state- and service-quality information to stakeholders efficiently and thoroughly
How to Virtualize With Confidence 5
Visibility for Accurately and Quickly Resolving Performance Issues The inherent risk in virtualizing critical tier 1 applications and infrastructure lies in both ensuring and communicating
the vital state and heath information of the virtual and physical infrastructures. To do so, organizations must adopt a
solution that is not only virtual-aware, but also virtual-exploitive. This solution should deliver capabilities for
diagnosing, detecting and resolving issues in the virtual and physical infrastructures side-by-side
Furthermore, accurate diagnosis must allow a drill-down into the root cause of issues in the infrastructure. For
example, if the Exchange e-mail service is experiencing delays related to a memory problem, the best approach
would be: first, to identify the locations of the components where problems exist (in both virtual or physical
environments); then, if the problem is in the virtual infrastructure, administrators must be able to drill down to find it
quickly, as well as obtain details about the alerts and visual presentation of the situation (for example, high CPU-
ready values on the VMware ESX server). Finally, administrators must be able to access either guidance on how to
resolve the problem, or launch an in-context automated workflow to correct it. Figure 1 shows ideal visibility of the
virtualized Exchange Server (virtualized state indicated by the blue tag in lower left corner of server icon), as well as a
quick view of the health of the supporting four core resources and the common monitoring components:
CPU
Memory
Network
Storage
Exchange Domain Controller Connectivity
Figure 1 also shows a dashboard that provides extensive visibility into resources highlighted by spinners,
send/receive and read/write motion indicators that change color on overall consumption or deviation from normal
values. This allows administrators to quickly detect, diagnose and resolve problems.
How to Virtualize With Confidence 6
Figure 1: vFoglight provides extensive visibility into the virtualized state and health of Exchange
Visibility must not only extend deeply into the AD and Exchange virtual and physical layers, but it must also be able to
reveal the information required for successfully managing the environment across the virtualized layer and within the
critical application infrastructure. For AD, visibility and analysis of key components—including forests, domains, sites
and domain controllers—must encompass both broad and granular data. With Exchange, key components to monitor
include roles, servers and sites. Figure 2 presents a “perspectives” view that includes data on critical components of
AD and Exchange in both VMware and Windows environments.
How to Virtualize With Confidence 7
Figure 2: This “perspectives” view provides insight of AD and Exchange components in both physical and virtual
environments.
With the data provided in Figure 2, administrators can get a quick assessment of the current state of the
environments. They can conduct further investigations into issues using color-coded symbols, which lead them to
problem areas. By clicking the “Explore” button, they can drill down to details. Figure 3 shows an example of a drill-
down into the data for two virtual servers hosting domain controllers in a caution state.
How to Virtualize With Confidence 8
Figure 3: Presentation of detailed data on health of AD and its associated components after administrators drill down
through the interface.
From Detection to Diagnosis and Resolution Visual cues, along with essential alerts and reports, provide a clear understanding of the health of both virtual and
physical environments. These capabilities guide administrators to accurately diagnose problems and fix them quickly.
This level of management must provide:
Visibility through logical and architectural representations of the AD and Exchange state and relationships,
including associations to the physical and virtual infrastructure
Out-of-the-box alerts, with expert advice, to help administrators reduce mean time to resolution (MTTR) for
incidents and problems affecting AD and Exchange performance and availability
Service-level performance and availability reports to show how AD and Exchange infrastructure is
supporting the business
An effective solution must help administrators accurately identify the root cause of issues and resolve them quickly.
Moreover, the solution must provide views that show data about the critical infrastructure and applications from the
operating system to the hypervisor (if applicable).
How to Virtualize With Confidence 9
Conclusion Success in server virtualization depends on innovative performance-management technologies and practices.
Examining the virtualization layer in depth with a solution specifically designed for managing virtualized environments
from the ground up is essential.
When virtualizing AD and Exchange environments, the solution must be built to manage and monitor performance
across the multiple, diverse components in both physical and virtual environments. The ability to detect, diagnose and
resolve issues related to their interdependent components is also necessary.
Quest® vFoglight®, along with the Foglight® for Active Directory and Foglight® for Exchange cartridges provide the
capabilities for managing the entire infrastructure with greater efficiency and less risk. They allow administrators to
detect, diagnose and resolve problems affecting AD and Exchange -- as well as related components -- for both virtual
and physical environments. With vFoglight, administrators can visualize the AD and Exchange state and relationships
through logical and architectural representations. They can also use out-of-the-box alerts and built-in, expert advice
to maintain performance and availability. Service level agreement reports show how effective management of the
environment supports the business.
How to Virtualize With Confidence 10
About the Author Ben manages product marketing for the Quest vFoglight virtualization monitoring solutions. His 18 years of industry
experience includes CA, Inc. and Vizioncore (which Quest acquired). Ben has served in a variety of roles, including
software sales and as consultant for product and solutions marketing. He speaks frequently at industry events and
has published a host of articles and white papers on IT management topics. Ben holds a master’s degree in
computer information systems from the University of Denver as well as a bachelor’s degree in marketing from
Western Michigan University. He is ITIL® V3 Foundation-certified.
How to Virtualize With Confidence 11
© 2010 Quest Software, Inc.
ALL RIGHTS RESERVED.
This document contains proprietary information protected by copyright. No part of this document may be reproduced
or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any
purpose without the written permission of Quest Software, Inc. (“Quest”).
The information in this document is provided in connection with Quest products. No license, express or implied, by
estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of
Quest products. EXCEPT AS SET FORTH IN QUEST'S TERMS AND CONDITIONS AS SPECIFIED IN THE
LICENSE AGREEMENT FOR THIS PRODUCT, QUEST ASSUMES NO LIABILITY WHATSOEVER AND
DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A
PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST BE LIABLE FOR ANY
DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF
INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST HAS
BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest makes no representations or warranties with
respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to
specifications and product descriptions at any time without notice. Quest does not make any commitment to update
the information contained in this document.
If you have any questions regarding your potential use of this material, contact:
Quest Software World Headquarters
LEGAL Dept
5 Polaris Way
Aliso Viejo, CA 92656
www.quest.com
email: [email protected]
Refer to our Web site for regional and international office information.
Trademarks
Quest, Quest Software, the Quest Software logo, AccessManager, ActiveRoles, Aelita, Akonix, AppAssure,
Benchmark Factory, Big Brother, BridgeAccess, BridgeAutoEscalate, BridgeSearch, BridgeTrak, BusinessInsight,
ChangeAuditor, ChangeManager, Defender, DeployDirector, Desktop Authority, DirectoryAnalyzer,
DirectoryTroubleshooter, DS Analyzer, DS Expert, Foglight, GPOADmin, Help Desk Authority, Imceda, IntelliProfile,
InTrust, Invirtus, iToken, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, LogADmin, MessageStats,
Monosphere, MultSess, NBSpool, NetBase, NetControl, Npulse, NetPro, PassGo, PerformaSure, Point,Click,Done!,
PowerGUI, Quest Central, Quest vToolkit, Quest vWorkSpace, ReportADmin, RestoreADmin, ScriptLogic, Security
Lifecycle Map, SelfServiceADmin, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL Navigator, SQL Watch, SQLab,
Stat, StealthCollect, Storage Horizon, Tag and Follow, Toad, T.O.A.D., Toad World, vAutomator, vControl,
vConverter, vFoglight, vOptimizer, vRanger, Vintela, Virtual DBA, VizionCore, Vizioncore vAutomation Suite,
Vizioncore vBackup, Vizioncore vEssentials, Vizioncore vMigrator, Vizioncore vReplicator, WebDefender, Webthority,
Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America
and other countries. Other trademarks and registered trademarks used in this guide are property of their respective
owners.
Updated—[MONTH, YEAR]
5 Polaris Way, Aliso Viejo, CA 92656 | PHONE 800.306.9329 | WEB www.quest.com | E-MAIL [email protected]
If you are located outside North America, you can find local office information on our Web site.
TECHNICAL BRIEF
About Quest Software, Inc.
Quest simplifies and reduces the cost of managing IT for more than 100,000 customers
worldwide. Our innovative solutions make solving the toughest IT management problems
easier, enabling customers to save time and money across physical, virtual and cloud
environments. For more information about Quest go to www.quest.com.
Contacting Quest Software
PHONE 800.306.9329 (United States and Canada)
If you are located outside North America, you can find your
local office information on our Web site.
E-MAIL [email protected]
MAIL Quest Software, Inc.
World Headquarters
5 Polaris Way
Aliso Viejo, CA 92656
USA
Contacting Quest Support
Quest Support is available to customers who have a trial version of a Quest product or who
have purchased a commercial version and have a valid maintenance contract.
Quest Support provides around-the-clock coverage with SupportLink, our Web self-service.
Visit SupportLink at https://support.quest.com.
SupportLink gives users of Quest Software products the ability to:
• Search Quest’s online Knowledgebase
• Download the latest releases, documentation, and patches for Quest products
• Log support cases
• Manage existing support cases
View the Global Support Guide for a detailed explanation of support programs, online services,
contact information, and policies and procedures.
© 2010 Quest Software, Inc. ALL RIGHTS RESERVED.
Quest, Quest Software, the Quest Software logo are registered trademarks of Quest Software, Inc. in the U.S.A. and/or other countries. All other trademarks and registered trademarks are property of their respective owners. TBD-VirtWithConfidence-US-EH20101109