Screencast

Resource allocation for Microsoft Virtual Server 2005 R2 virtual machines: A screencast

Takeaway: By default, most virtualization platforms will treat all of your VMs (virtual machines) equally. They'll all get the same priority levels and access to system resource such as CPU time. But what if some VMs are more important than others? And how can you prevent some VMs from monopolizing CPU time on a single host server? Microsoft Virtual Server provides two methods for managing the priorities of virtual machines. They're called weight-based and constraint-based resource allocation. This screencast will describe the two methods and provide a live demonstration of how you can manage these resources on your test and production host servers. Running time: Approx. 16 minutes

 

Anil Desai



About the speaker: Anil Desai is an independent consultant and IT book author who has managed datacenter environments that support thousands of virtual machines. Anil is an MCSE, MCSD, MCDBA and a Microsoft MVP (Windows Server -- Management Infrastructure).

Learn more about managing virtual machines:

  • A backup strategy for Microsoft Virtual Server virtual machines: Suspend, snap, resume
    No piece of data is protected unless you have a proper backup strategy for it. That's why the .VHD files used in Microsoft Virtual Server 2005 R2 pose a problem; their size and peculiar properties make backup difficult.

     

  • Control virtualization chaos with VM management automation
    Too few IT managers evaluate a very important aspect of data center management: Automating the provisioning of virtual machines (VMs). In fact, all IT organizations would benefit from examining automated virtualization management in general. This article looks at how this capability will become a must-have very soon, driving vendors' product development in the next few years, and at the products available today.

     

  • Improving Microsoft Virtual Server security: Preventing and detecting rogue virtual machines
    This article details how to detect rogue virtual machines on your network. Also, find out why the potent combination of Alternate Data Streams and virtual machines could make searching for rogue virtual machines more difficult.

     

  • Chapter download: Managing virtual hard disks
    "Managing Virtual Hard Disks" by Anil Desai is broken down into several sub-titles: "Disk Architecter Overview," "Working With Virtual Hard Disks," "Maintaining VHDs" and "Managing Hard Disk Attachments." It also includes several code samples.

     

  • Managing virtual environments
    Everything on the site pertaining to virtualization management -- news, tips, advice, and more -- is listed in this topic.

This was first published in May 2007

Join the conversation Comment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.