Foreword |
|
xv | |
Acknowledgments |
|
xvii | |
Introduction |
|
xix | |
|
Part I Architect for Virtualization |
|
|
|
The Move to Virtualization |
|
|
3 | (10) |
|
|
5 | (6) |
|
|
8 | (3) |
|
|
11 | (2) |
|
Begin the Five-Step Process |
|
|
13 | (32) |
|
|
14 | (9) |
|
Inventory, Inventory, Inventory |
|
|
15 | (1) |
|
Scan for Potential Virtualization Candidates |
|
|
16 | (5) |
|
Categorize Server Resources |
|
|
21 | (2) |
|
|
23 | (1) |
|
|
23 | (20) |
|
|
25 | (5) |
|
What Is a Virtual Machine? |
|
|
30 | (2) |
|
Server Virtualization Models |
|
|
32 | (2) |
|
Major Server Virtualization Vendors |
|
|
34 | (5) |
|
|
39 | (1) |
|
Application Virtualization |
|
|
40 | (3) |
|
Work with the First Two Steps |
|
|
43 | (2) |
|
Complete the Five-Step Process |
|
|
45 | (20) |
|
|
46 | (9) |
|
|
46 | (3) |
|
|
49 | (2) |
|
Be Aware of Licensing Costs |
|
|
51 | (2) |
|
Rely on New Server Form Factors |
|
|
53 | (2) |
|
|
55 | (2) |
|
|
57 | (3) |
|
|
59 | (1) |
|
Rely on the Virtualization Decision Flowchart |
|
|
60 | (5) |
|
Part II Build Your Virtualization Infrastructure |
|
|
|
Perform a Comprehensive Analysis |
|
|
65 | (26) |
|
|
67 | |
|
Perform a Comprehensive Analysis |
|
|
65 | (2) |
|
|
67 | (4) |
|
Perform a Storage Consolidation Study |
|
|
71 | (10) |
|
|
81 | (4) |
|
Perform a Server Consolidation Study |
|
|
85 | (3) |
|
Identify Appropriate Performance Metrics |
|
|
86 | (2) |
|
|
88 | (1) |
|
Rationalize Everything Again |
|
|
88 | (3) |
|
|
91 | (28) |
|
|
92 | (3) |
|
|
92 | (2) |
|
|
94 | (1) |
|
Choose the Implementation Method |
|
|
95 | (1) |
|
Prepare the Network Layer |
|
|
95 | (4) |
|
Networking in Virtual Layers |
|
|
97 | (2) |
|
|
99 | (8) |
|
Prepare Storage Configurations |
|
|
102 | (1) |
|
|
103 | (3) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (10) |
|
Server Sizing for Resource Pools |
|
|
110 | (3) |
|
Sizing Recommendations for Resource Pools |
|
|
113 | (1) |
|
|
114 | (1) |
|
Rely on Hardware-Integrated Hypervisors |
|
|
114 | (2) |
|
Build Your Own Hypervisor Hardware |
|
|
116 | (1) |
|
|
117 | (2) |
|
Begin with the Testing Environment |
|
|
119 | (34) |
|
Work with Different Testing Levels |
|
|
122 | (2) |
|
Rely on Virtual Machine Software |
|
|
124 | (1) |
|
Physical Versus Logical Workspaces |
|
|
125 | (1) |
|
|
126 | (7) |
|
Host Server Configurations |
|
|
126 | (1) |
|
Virtual Machine Configurations |
|
|
127 | (2) |
|
|
129 | (1) |
|
Required Server and Workstation Roles |
|
|
129 | (3) |
|
Requirements for Each Testing Level |
|
|
132 | (1) |
|
Create the Lab Environment |
|
|
133 | (9) |
|
Virtual Machines and Software Licensing |
|
|
135 | (2) |
|
Build Complete Environments |
|
|
137 | (1) |
|
Virtual Laboratory Deliverables |
|
|
138 | (4) |
|
Reuse of the Lab Deliverables |
|
|
142 | (3) |
|
|
142 | (1) |
|
|
142 | (2) |
|
|
144 | (1) |
|
|
144 | (1) |
|
Virtual Infrastructure Laboratory Management Practices |
|
|
145 | (4) |
|
|
146 | (1) |
|
|
147 | (1) |
|
Backup and Disaster Recovery |
|
|
147 | (1) |
|
Lab Maintenance Procedures |
|
|
148 | (1) |
|
Virtual Lab Best Practices Summary |
|
|
149 | (2) |
|
Move On to the Virtual Datacenter |
|
|
151 | (2) |
|
Work with Server Virtualization |
|
|
153 | (40) |
|
Choose a Server Virtualization Technology |
|
|
155 | (1) |
|
Technologies and Scenarios |
|
|
156 | (29) |
|
Server Virtualization Scenarios |
|
|
158 | (2) |
|
|
160 | (1) |
|
VMware Technology Components |
|
|
161 | (12) |
|
Citrix Virtualization Technologies |
|
|
173 | (3) |
|
Microsoft Virtualization Technologies |
|
|
176 | (4) |
|
|
180 | (2) |
|
|
182 | (3) |
|
Virtualization Technology Pricing |
|
|
185 | (2) |
|
Market-Leader Hypervisor Metrics |
|
|
187 | (6) |
|
Market-Leader Hypervisor Positioning |
|
|
191 | (2) |
|
Work with Virtual Workloads |
|
|
193 | (16) |
|
The Server Virtualization Decision Process |
|
|
194 | (3) |
|
Virtual Service Offerings Structure |
|
|
197 | (3) |
|
Virtual Resource Allocation Rules |
|
|
200 | (7) |
|
|
202 | (2) |
|
Single Versus Multi-VM Hosts |
|
|
204 | (2) |
|
Work with the Network Layer |
|
|
206 | (1) |
|
Best Practices in Server Virtualization |
|
|
207 | (2) |
|
Provision Virtual Machines |
|
|
209 | (24) |
|
|
213 | (2) |
|
Provision New Virtual Machines |
|
|
215 | (8) |
|
Create Seed Virtual Machines |
|
|
216 | (1) |
|
Provision Using Seed Machines |
|
|
216 | (1) |
|
Physical Versus Virtual Provisioning |
|
|
217 | (1) |
|
Rely on Virtual Appliances |
|
|
218 | (3) |
|
Virtual Appliance Benefits |
|
|
221 | (1) |
|
Create Virtual Applicances of Your Own |
|
|
222 | (1) |
|
Perform Physical-to-Virtual Conversions |
|
|
223 | (8) |
|
|
223 | (2) |
|
|
225 | (1) |
|
Work with VMware Converter |
|
|
226 | (2) |
|
Work with PlateSpin PowerConvert |
|
|
228 | (1) |
|
Rely on the Ultimate-P2V Plug-in for BartPE |
|
|
229 | (1) |
|
Microsoft Conversion Tools |
|
|
229 | (2) |
|
Provisioning Best Practices |
|
|
231 | (2) |
|
Work with Desktop Virtualization |
|
|
233 | (32) |
|
|
234 | (3) |
|
Desktop Management Issues |
|
|
237 | (2) |
|
|
237 | (1) |
|
|
238 | (1) |
|
Move to Desktop Virtualization |
|
|
239 | (9) |
|
Available Desktop Virtualization Products |
|
|
240 | (1) |
|
Virtual Desktop Licensing |
|
|
241 | (2) |
|
Potential Desktop Virtualization Scenarios |
|
|
243 | (3) |
|
Identify Desktop Virtualization Audiences |
|
|
246 | (2) |
|
Centralized Desktop Virtualization Infrastructures |
|
|
248 | (14) |
|
VMware Virtual Desktop Manager |
|
|
250 | (7) |
|
|
257 | (3) |
|
|
260 | (2) |
|
|
262 | (3) |
|
|
264 | (1) |
|
Make the Desktop Virtualization Decision |
|
|
264 | (1) |
|
Work with Application Virtualization |
|
|
265 | (20) |
|
Application Management Issues |
|
|
266 | (6) |
|
Traditional Application Management Solutions |
|
|
267 | (5) |
|
Redesign Application Management |
|
|
272 | (11) |
|
Work with a Virtualization Layer |
|
|
273 | (8) |
|
Application Streaming: A New Distribution Strategy |
|
|
281 | (2) |
|
Benefits of App V for the Organization |
|
|
283 | (2) |
|
|
285 | (28) |
|
Compare Application Virtualization Products |
|
|
286 | (8) |
|
|
290 | (1) |
|
|
290 | (1) |
|
Microsoft Application Virtualization |
|
|
291 | (1) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
293 | (1) |
|
Use the AppV Decision Process |
|
|
293 | (1) |
|
|
294 | (2) |
|
Integrate Application, Profile, and Desktop Virtualization |
|
|
296 | (14) |
|
Assign Applications on Demand |
|
|
297 | (1) |
|
Use a Volatile Desktop VM |
|
|
298 | (1) |
|
|
299 | (2) |
|
Create the Personality Protection Strategy |
|
|
301 | (9) |
|
Finalize the Personality Protection Strategy |
|
|
310 | (1) |
|
Key Points on the Perfect Desktop |
|
|
310 | (3) |
|
Part III Consolldate the Benefits |
|
|
|
Secure Your Virtual Infrastructure |
|
|
313 | (42) |
|
The Castle Defense System |
|
|
315 | (12) |
|
Resource Pools Versus Virtual Service Offering |
|
|
317 | (2) |
|
|
319 | (3) |
|
Secure Virtual Service Offerings |
|
|
322 | (5) |
|
Apply the Castle Defense System to the Resource Pool |
|
|
327 | (25) |
|
|
327 | (3) |
|
|
330 | (2) |
|
Operating System Hardening |
|
|
332 | (10) |
|
|
342 | (4) |
|
|
346 | (6) |
|
Complete the Resource Pool Security Policy |
|
|
352 | (3) |
|
Protect Your Virtual Infrastructure |
|
|
355 | (14) |
|
Develop your System Protection Strategies |
|
|
356 | (12) |
|
Use Standard System Recovery Strategies |
|
|
357 | (2) |
|
Hypervisor Manufacturer Offering |
|
|
359 | (7) |
|
Data Protection Strategies for Virtual Service Offering |
|
|
366 | (1) |
|
Select a Third-Party Backup Tool |
|
|
367 | (1) |
|
Complete the Recovery Strategy |
|
|
368 | (1) |
|
Prepare for Business Continuity |
|
|
369 | (34) |
|
Business Continuity Essentials |
|
|
370 | (24) |
|
Make the Resource Pool Highly Available |
|
|
372 | (8) |
|
Protect Your Virtual Service Offerings |
|
|
380 | (7) |
|
Make Virtual Desktops Highly Available |
|
|
387 | (5) |
|
Make Virtual Applications Highly Available |
|
|
392 | (2) |
|
Make Profiles Highly Available |
|
|
394 | (1) |
|
Build Your Business Continuity Strategy |
|
|
394 | (9) |
|
Provide Multisite Redundancy |
|
|
395 | (1) |
|
Adjust Your Service Level Agreements |
|
|
396 | (1) |
|
Business Continuity Management Through Replication |
|
|
397 | (2) |
|
Choose the Proper Replication Tool |
|
|
399 | (2) |
|
Prepare for Site-Based Disasters |
|
|
401 | (2) |
|
Update Your Management Structure |
|
|
403 | (16) |
|
Look to New Administative Roles |
|
|
404 | (1) |
|
Move to Policy-Based Workloads |
|
|
404 | (4) |
|
Policy-Based Resource Management |
|
|
408 | (6) |
|
Look to Third-Party Management Tools |
|
|
414 | (3) |
|
Update Your Management Practices |
|
|
417 | (2) |
Afterword |
|
419 | (2) |
Calculate Your Return on Investment |
|
421 | (2) |
Index |
|
423 | |