SlideShare a Scribd company logo
Understanding Virtualization’s Role in Auditing and SecurityGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
Who Am I?Greg Shields, MVP, vExpertNearly 15 years of Windows administration and engineering experience.Consultant – Multiple engagements all across the countryConference speaker – TechMentor, Windows Connections, MMS, Tech Ed, ISACA, FOSE, VMworld, Tech TrifectaAuthor – Eleven books, including The Shortcut Guide to Implementing Virtualization in the Small Environment, The Shortcut Guide to Virtualization & Service Automation, and The Shortcut Guide to Selecting the Right Virtualization SolutionColumnist – TechNet Magazine, IT EXPERT Magazine, Redmond Magazine, Virtualization Review Magazine, MCPmag.comVideo Trainer – CBT Nuggets, including video series’ on Hyper-V, ESX 3.5, and vSphereBlogger – www.concentratedtech.comAll-around good guy…
Who is Concentrated Technology?A collaboration between IT gurus Greg Shields andDon Jones, www.ConcentratedTech.com is a place for concise, helpful IT news and education.Our emphasis is on concise…We believe in the open sharing of our slide decks.Couldn’t make Tech Ed?No time for VMworld?We hit them all, and want to share them with you…If you’re interested in these slides, as well as every other deckwe’ve presented this year……at the end of the session today, let’s trade email addresses.  We’ll add you to our newsletter list.4
4½ Modules to Virtual Excellence…Module 0:  So…What is Virtualization?Module 1:  The Seven Elements of a Successful Virtualization ArchitectureModule 2:  Understanding the Technologies Behind VMware vSphere VirtualizationLunch!Module 3: Understanding the Technologies Behind Hyper-V VirtualizationModule 4:  Formal Guidance in Securing & Auditing the vSphere Environment, Beyond the Physical
So, What is Virtualization?Virtualization:Virtualization is involved with the abstraction of computer resources.Virtualization decouples physical hardware from installed operating systems.Leverages a “hypervisor” layer that is installed directly atop physical hardware.This hypervisor abstracts physical resources to create a unified platform upon which all virtual machines reside.6
So, What is Virtualization?Virtualization:Virtualization is involved with the abstraction of computer resources.Virtualization decouples physical hardware from installed operating systems.Leverages a “hypervisor” layer that is installed directly atop physical hardware.This hypervisor abstracts physical resources to create a unified platform upon which all virtual machines reside.Think of virtualization as a “shim” betweenthe physical hardware and the virtual machine7
What Virtualization DoesEntire System VirtualizationVirtualizes the “Core Four”MemoryProcessorNetwork CardDisk
What Virtualization DoesMemorySystem memory shared between the host system and the VM’s.VM memory is not addressable by the system and vice versa.ProcessorProcesses in the virtual machines run on the host.The host distributes requests among available physical processors.Network CardVirtual network cards share available physical network cards.Virtual network cards can communicate privately with other VM’s or can route to the external network.Ability to create internal virtual networks.DiskVirtual disks exist as a series of files on the host.
What Virtualization DoesMemorySystem memory shared between the host system and the VM’s.VM memory is not addressable by the system and vice versa.ProcessorProcesses in the virtual machines run on the host.The host distributes requests among available physical processors.Network CardVirtual network cards share available physical network cards.Virtual network cards can communicate privately with other VM’s or can route to the external network.Ability to create internal virtual networks.DiskVirtual disks exist as a series of files on the host.So, a virtual machine is just a FILE.Files are morePortable, Restorable, and Manageable.
The ApproachVirtualization…Breaks hardware dependencies – all virtual hardware is the same!Provides security outside the OS context.Allows multiple servers to run on one host server.ApplicationApplicationApplicationApplicationApplicationApplicationApplicationApplicationApplicationOSOSOSOSOSOSOSOSOSVirtual MachineVirtual MachineVirtual MachineVirtual MachineVirtual MachineVirtual MachineHardwareHardwareHardwareHardware
What it Does Not DoDiscernibly change the operating or Operating System environmentDual-boot or dual-partition the host’s diskAllow you to drop all your servers onto a single host serverConstrained by available Processors & RAMVirtualize everything in the server roomNot a panacea!Specific candidates must be identified for virtualization
What Problems Does this Solve?Disaster Recovery“Replicating my data to an off-site location is great.  But, if the applications that use that data are unavailable, I’m still down.”Server Consolidation“My Data Center is currently at 103% capacity in space/power/cooling.  The incremental cost for more is prohibitive compared to consolidating my servers.”Rapid Deployment“It takes 20 hours to provision a server from cardboard to server rack.  I need this done in less than 2 hours.”
What Problems Does this Solve?Systems Commonality“I have five different server types.  Sometimes when I patch or update my systems, they crash.  I don’t have time to regression test against all my hardware types.”Dev/Test“I am building a software application and need to create separate testing environments.  I need to be able to completely rebuild these environments in a matter of hours to support various tests.”IT Testing/Patching“Before I deploy Microsoft’s monthly patches to my servers, I need to fully test these patches against exact duplicates all my server configurations.”
Hard Cost Savings – Power/CoolingXcel Energy customers pay 8.5¢ per kWh.	A low-end, lightly used Windows Server consumes 295W of electricity.	Over a one-year period, these ten servers will cost $2,190 to power.A high-end, heavily-used Windows Server running 10 virtual servers consumes 351W of electricity.	Over a one-year period, these ten virtual servers will cost $261 to power.
Hard Cost Savings – Server RefreshAn low-end Windows Server can cost $4,500.	The median salary for a Sr. NT Systems Administrator in the Rocky Mountain Region is $45.	At 20 hours per physical server to provision from cardboard to rack, the opportunity cost is $900.	Replacing 10 end-of-life machines will cost $54,000.A virtualization-capable Windows Server can cost $15,000.	At 20 hours per physical server to provision from cardboard to rack, opportunity cost is $900.At 2 hours per virtual server to provision, opportunity cost per server is $90.	Replacing 10 end-of-life machines will cost $16,800.
Soft Cost SavingsOpportunity cost incurred when system resource overuse causes effective DoS and administrators unable to spin up additional hardware fast enough.Real cost of lost revenue immediately after DR event when users cannot access necessary data and applications.Low-use servers incur opportunity cost in terms of dollars per useful processor cycle.  Servers at 3% to 5% utilized are wasting processor cycles on System Idle Process.Risk (and associated cost) of system crash incurred during patch/update operations on untested hardware or non-uniform hardware.
A Visual Cost JustificationSmall Server$4,5001:1$4,500 per Server8:1Large Server$15,000$20,000$2,500 per Server20:1$1,33315:1$1,000Virtualization$5,000Large MarginalCost Increases perAdditional Server+ Power+ Cooling+ Provisioning LaborSmaller Marginal Cost Increases
The Seven Elements of a Successful Virtualization ArchitectureGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
44% of Virtualization Deployments FailAccording to a CA announcement from 2007.Inability to quantify ROIInsufficient administrator trainingExpectations not aligned with resultsSuccess =Measure performanceDiligent inventoryLoad DistributionThorough Investigation of Technology
55% Experience More Problems than Benefits with VirtualizationAccording to an Interop survey in May, 2009.Lack of visibilityLack of tools to troubleshoot performance problemsInsufficient education on virtual infrastructure softwareStatistics:27% could not visualize / manage performance25% cite training shortfalls21% unable to secure the infrastructure50% say that implementation costs are too high
The Seven Elements…Step -1: Hype Recognition & EducationStep 0: AssessmentStep 1: Purchase & ImplementationStep 2: P2VStep 3: High AvailabilityStep 4: Backups ExpansionStep 5: Virtualization at the DesktopStep 6: DR Implementation
Step 0Assessment
The Virtualization AssessmentSuccessful rollouts need a virtualization assessment.You must analyze your environment before you act.Virtualization assessment should include:Inventory of serversInventory of attached peripheralsPerformance characteristics of serversAnalysis of performance characteristicsAnalysis of hardware needs to support virtualized serversBackups AnalysisDisaster Recovery Analysis (Hot vs. warm vs. cold)Initial virtual resource assignment suggestions
Easy Candidates for VirtualizationLow processor utilizationLow memory requirementsWe too often add too much RAM in a server.Low context switchesInfrastructure serversRedundant or warm-spare serversOccasional- or limited-use serversSystems where many partially-trusted people need console access
Not Candidates for VirtualizationHigh and constant processor / memory utilizationHigh context switchesAttached peripheralsSerial / parallel / USB / External SCSI /License Keyfobs / Scanners / Bar Code ReadersVery high network useGigabit networking requirementsSpecialized hardware requirementsHardware appliances / Pre-built / Unique configsTerminal Servers!…at least with today’s technology…
Performance is Job OneIn the early days of virtualization, we used to say…“Exchange Servers can’t be virtualized”“Terminal Servers can’t be virtualized”“You’ll never virtualize a SQL box”Today’s common knowledge is that the decision relates entirely to performance.Thus, before you can determine which servers to virtualize you must understand their performance.Measure that performance over time.Compile results into reports and look for deviations from nominal activity.
Useful Performance Counters
Useful Performance CountersThese are starting points.Your actual thresholds may be different.
The Virtualization Assessment
The Virtualization AssessmentRelatively Low Processor Use,but…
The Virtualization AssessmentHigh Memory Pages/secCrazy High Context Switches & ThreadsRidiculous% Disk Time
Gathering PerformancePerfMon is the only mechanism that can gather these statistics from servers.But PerfMon is ridiculouslychallenging to use.Other products assist...Microsoft Assessment & Planning Solution AcceleratorVMware Consolidation & Capacity PlannerPlatespinPowerReconCiRBA
Step 1Purchase & Implementation
Three Types of VirtualizationEntire System VirtualizationVMwareMicrosoft Virtual ServerOS VirtualizationParallels VirtuozzoParavirtualizationMicrosoft Hyper-VXen / Citrix XenSourceVirtual O/S is entire system.No awarenessof underlying host system.OS instances are “deltas”of the host configuration.Similar to HardwareVirtualization, but Virtual O/Sis “aware” it is virtualized.
Hardware VirtualizationESX / vSphereHybrid hypervisor and host OSDevice drivers in the hypervisorEmulation (translation from emulated driver to real driver)High cost, high availability, high performance
ParavirtualizationHyper-V, Xen, Citrix XenSourceHost OS becomes primary partition above hypervisor.Device drivers in the primary partitionParavirtualization (no emulation for “enlightened” VMs)Low cost, moderate-to-high availability, high performance
Hardware VirtualizationMicrosoft Virtual ServerHypervisor above host OS.  Installed to host OS.Device drivers in hypervisorEmulation (translation from emulated driver to real driver)Low cost, low availability, low performance
OS VirtualizationParallels VirtuozzoEach VM is comprised of the host config + deltas.No traditional hypervisor.  V-layer processes requests.All real device drivers hosted on host OSModerate cost, moderate availability, very high perf.
Step 2P2V
P2V, A Tool, A ProcessAfter environment stand-up, P2V process converts physical machines to virtual ones.A “ghost” + a “driver injection”Numerous applications can do this in one step.SCVMM, Converter, 3rd PartiesThese days, P2V process is commodity.Everyone has their own version.Some are faster.  Some muchslower.Paid options == faster.
P2V, A Tool, A Process
P2V, P2V-DRP2VPhysical 2 Virtual machine conversionA tool as well as a processSCVMM, VMware VI/Converter, Acronis, Leostream, others.P2V-DRSimilar to P2V, but with interim step of image creation/storage.“Poor-man’s DR”
P2V-DR UsesP2V-DR can be leveraged for medium-term storage of server imagesUseful when DR site does not have hot backup capability or requirementsRegularly create images of physical servers, but only store those images rather than load to virtual environmentCheaper-to-maintain DR environmentNot fast.Not easy.Not completely reliable.…but essentially cost-free.
Step 3High Availability
What Really is High Availability?Part 1:  Protection from Host Failures
What Really is High Availability?Part 2:  Load Balancing of VM/host Resources
Costs vs. BenefitsHigh-availability adds dramatically greater uptime for virtual machines.Protection against host failuresProtection against resource overuseProtection against scheduled/unscheduled downtimeHigh-availability also adds much greater cost…Shared storage between hostsConnectivityHigher (and more expensive) software editionsNot every environment needs HA!
Common Features in High-End PlatformsLive migration enables running virtual machines to be moved to an alternate host before a host failure.Automated relocation to new hardware and restart of virtual machines immediately upon a host failure.Load balancing calculations that manually or automatically re-balance running virtual machines across hosts to prevent resource contention.Disk storage migration that enables the zero-impact relocation of virtual machine disk files to alternate storage.Automated replication features that copy backed up virtual machines to alternate locations for disaster recovery purposes.
Step 4Backups Expansion
Backup TerminologyFile-Level BackupBackup Agent in the Virtual MachineBlock-Level BackupBackup Agent on the Virtual HostQuiescenceQuieting the file system to prep for a backupO/S Crash ConsistencyCapability for post-restore O/S functionalityApplication Crash ConsistencyCapability for post-restore application functionality
Four Types of BackupsBacking up the host systemMay be necessary to maintain host configurationBut often, not completely necessaryThe fastest fix for a broken host is often a complete rebuildBacking up Virtual Disk FilesFast and can be done from a single host-based backup clientChallenging to do file-level restoreBacking up VMs from inside the VMSlower and requires backup clients in every VM.Resource intensive on hostCapable of doing file-level restoresBack up VMs from the storage perspectiveLeverage storage frame utilities to complete the backup.
Four Types of Backups
The Problem with Transactional DatabasesO/S Crash Consistency is easy to obtain.Just quiesce the file system before beginning the backup.Application Crash Consistency much harder.Transactional databases like AD, Exchange, SQL don’t quiesce when the file system does.Need to stop these databases before quiescing.Or, need an agent in the VM that handles DB quiescing.Restoration without crash consistency will lose data.DB restores into “inconsistent” state.
The Problem with Transactional DatabasesFor VMs, must consider file-level backups and block-level backups.“Top-down” vs. “Bottom-up”File-level backups provide individual file restorabilityFile-level backups provide transactional database crash consistency.Block-level backups provide whole-server restorability.Not all block-level backups provide app crash consistency.Windows VSS can quiesce apps prior to snapping a backup.Advantage:  Hyper-V!
Four-Step Process for VSSStep 1:  A requestor, such as backup software, requests the server to invoke a shadow copy.Step 2:  A provider accepts the request and calls  an application-specific provider (SQL, Exchange, etc.) if necessary.Step 3:  Application-specific provider coordinates system shadow copy with app quiescence to ensure application consistency.Step 4:  Shadow copy is created.…then the backup starts…56
Step 5Virtualization at the Desktop
Desktop Virtualization = VDI = Hosted DesktopsOnce you fully embrace virtualization for your servers, desktop are a next common focus.VDI is all about the apps.HOWEVER, BEWARE VDI!VDI is a much more complex beast than Terminal Services, Citrix XenApp, or other presentation virtualization platforms.It is also dramatically more expensive.Potential VDI’s Use CasesApplications that simply don’t work atop RDS/CitrixHigh-utilization apps that require remote accessPeripherals
Step 6DR Implementation
Disaster RecoveryWhat is Disaster Recovery?Disaster Recovery intends to provide continuity of business services after a critical event.Disaster Recovery is invoked after the large-scale loss of primary business services.DR is not the restoration of a critical server.DR is not the restoration of a critical business service.Why the distinction?DR solutions do not resolve daily operational issues.Often, failback is challenging.
DR, meet Virtualization…Early all-physical attempts at DR were cost-prohibitive and operationally complex.Identical server inventory at primary and backup site.Management cost of identical server configuration.  Change management costs prohibitive.Virtualization eliminates many previous barriers.Virtual servers are chassis independent.Image-level backup == image-level restore.Hot sites become only one of many options – cold & warm sites.Numerous cost-effective solutions available.Don’t believe the hype.Make decisions based on need.
DR, meet Virtualization…With virtualization,DR becomes little morethan……the regularly scheduledblock-level backup ofvirtual servers.…the relocation of thosebackups to an alternatelocation.…the powering on of thosevirtual machines after adisaster.
DR, meet Virtualization…So, what do you need?…a backup site.…alternate servers and a virtual platform.…VM-aware (and VSS-aware) backup software.…a replication mechanism.
Four General DR Tiers
Four General DR Tiers$$$$$$$$$$
Four General DR Tiers$ - Snap & PrayLeverage no-cost or low-cost tools to snapshot image-level backups of VM’s.Cold site and replacement equipment on retainer.Store images to tape.  Rotate tapes off-site.Restoration:Activate cold siteProcure reserved replacement equipmentProcure tapes and tape deviceRestore images to replacement equipmentResolve database (and some O/S) inconsistencies
Four General DR Tiers$$ - Warm SnapLeverage no-cost or low-cost tools to create image-level backups of VM’s.Connected warm site with data storage location.Transfer images to off-site data storage locationRestoration:Procure or spin up reserved replacement equipmentRestore images from data storage to replacement equipmentResolve database (and some O/S) inconsistenciesDisk-to-disk backups over the WAN increase backup time, but significantly reduce restore time.67
Four General DR Tiers$$$ - Inconsistent SAN-to-SANWarm site.  Both sites using SAN.  SAN-to-SAN replication instantiated between sites.SAN data is automatically replicated to remote site.Greater support for incrementals.  Less WAN usage.Restoration:Procure or spin up reserved replacement equipmentAttach virtual machines to replacement equipment and hit the “green VCR button”.Resolve database (and some O/S) inconsistenciesSAN replication is often not aware of quiescence, so this solution can be problematic.68
Four General DR Tiers$$$$ - Real-time ReplicationWarm or hot site.  Both sites using SAN.  SAN-to-SAN replication instantiated between sites.3rd Party tools used for image-to-image transfer.In-VM for transactional database quiescing.On-host for all other machines.Roll-back and roll-forward capabilitiesRestoration:Hit the “green VCR button”(or, auto-failover…)
Understanding the Technologies Behind VMware vSphereGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
What VMware DoesVirtualizes the Core FourMemoryProcessorNICDisk
The VMware Suite of ProductsVMware PlayerVMware WorkstationVMware ServerVMware ESX / vSphereVMware SRMVmwareThinAppVMware Lab ManagerIncreasing CostDecreasing SupportIncreasing Reliability
VMware vSphereAn OS all unto itself.Leverages a highly-customized RHEL v3 (Kernel 2.6.18-128.ESX) instance for its management partition.  ESXi eliminates the RHEL instance in favor of a proprietary VMware management partition.  Smaller.VMware suggests RHEL may be going away completely in future versions.A file system all unto itself.VMFS file system extremely efficient.Specially designed to handle...…extremely large files…multiple simultaneous server access…high disk utilization.
VMware vSphereVery specific hardware and O/S requirementsVMware’s use of drivers in the hypervisor means a small HCL for hardware.If your hardware is not on the VMware supportability matrix, ESX simply won’t load.More limited VM compatibilityDue to concerns about reliability.  Higher testing standards.Fewer OSs than other versions.Yet “the OSs you’ll want” are all available.Expensive in up-front costs, but can be less expensive in total cost per deployed server.
Absolute Minimum Requirements
Absolute Minimum Requirements
Absolute Minimum Requirements
Storage RequirementsYour choice of storage is incredibly important…VM processing highly dependant on rotation speed.Higher-quality storage = better experience, better scalabilityMust architect disk space to fit……the ESX server O/S and software…the full size of every concurrent VM…additional space for VM migration…snapshots…growth
ESX Supportability MatrixCritical:  Validate that your hardware is on the ESX HCL.Early ESX versions had limited support for hardware.  That support has grown to over 100 server vendors.Detailed information on supported hardware, storage, & IO can be found at:http://www.vmware.com/pdf/esx_systems_guide.pdfVerify CPU vendor, name, stepping, and chipset.Verify NIC, storage, iSCSI, graphics, FC HBA79
ESX User InterfacesVirtual Infrastructure ClientWhere most of the action happensClient/server app where most management occursService ConsoleThe host’s console screen itself“The Linux part”, typically accessed via SSHESXi has proprietary console (slow, limited functionality)Used less in ESX 3.x than in any previous versionRemote ConsoleRemote access to each VM’s console screenTcp/901Not intended to be a “thin” interface like Terminal Services
Networking & Virtual SwitchesVirtual Switches allow for rich intra-ESX network manipulation…Between two hosts on the same boxBetween a host and the “outside world”For the service console and VI ClientFor IP-based storageSupports complex networking arrangementsVLAN’s and security policiesTraffic shapingNIC teaming
Networking & Virtual Switches
Networking & Virtual Switches
Networking & Virtual Switches
Distributed Virtual SwitchesVirtual switches are host-dependent.When virtual machines VMotion, one must hope that the target virtual switch is correctly configured.Virtual switches are Layer 2 devices.No capacity for ACLing traffic between virtual machines on the same host.Virtual machines can collocate in inappropriate ways, which eliminates network protections.Distributed Virtual Switches create a “GIANT SWITCH” across an entire vCenter infrastructure.No longer host dependent, dVSs are managed by vCenter.Support for Private VLANs (PVLANs), virtualized DMZs.Available natively in vSphere, Cisco Nexus 1000V is 3rd party solution that adds more capabilities.
New Networking Features in 4.0VMDirectPath – Adds ability to connect VMs directly to physical NICs.40Gbps output per ESX/ESXi host – Improves raw performance across teamed connections.VMXNET3 – A new paravirtualized network driver for added performance.MTU Exposure – Admins can adjust MTU sizes.CDP Support – Support for Cisco Discovery Protocol, aids in network mapping within an ESX host.VLAN Trunking– Now able to trunk VLANs directly to VMs as opposed to terminating at the host boundary.
Storage OptionsESX can work with many types of storage.DASFibre ChannelWith attached HBAiSCSI SAN-attachedUsing both hardware and software initiatorsNAS & NFS-based storageCreates low-performance VMFS partitions on Unix/Linux NFS shares or SFU-proxied Windows CIFS sharesGrowing in use.Make sure to disable the ESX firewall for iSCSI and NFS connections!
DEMOViewing ESX Host Configurations
Virtual InfrastructureESXThe server that does the virtualizationvCenterComprised of vCenter Server, database, and license serverVirtual Infrastructure client connects to VC server and VI database.Heavy reliance on DNSEarly suggestions recommended non-virtualizedserver as VC server.  Today, virtualized VC servers are common.Light resource use on VC server
Our Virtual Infrastructure
DEMOReviewing vCenter Configurations
P2V & ConsolidationPhysical to Virtual machine conversionEssentially a “ghost” + a “driver injection”Enabled through VMware Converter toolThe Converter Plugin must be installed and Enabled first.Import Machine…VMware Consolidationextends P2V byanalyzing physicalcomputers forperformance andmakingrecommendations.
VMotioningCold migration vs. hot migrationVM is powered off for cold migrationVM is powered on for hot migrationAll migrations leverage VMotion interface unless one is not assigned.Then, all migrations use service console interfaceVMotion interface is not automatically createdEnsure network connectivity and DNS resolution at target chassisEspecially during cross-site DR migrations.
Processor Gotcha’sBe aware of processor gotcha’s for VMotioning!Can VMotion between processors of different speeds, cache sizes, and number of cores.However, cannot VMotion between different processor classesIntel to AMD, AMD to IntelP3 to P4, P4 to P3, “all-the-other-combinations”Intel’s XD and AMD’s NX bit are functionally similar, but not compatibleEnhanced VMotion Compatibility improves the range of cross-processor VMotion capabilitiesHandles processor instruction masking for youMORAL:  Be careful before you buy hardware.94
Processor Gotcha’sVMotion CPU Compatibility for Intel processors:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1991VMotion CPU Compatibility for AMD processors:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1992Unsupported mechanism for manually masking processor instructionshttp://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1993http://www.realtime-windowsserver.com/podcast/2007/06/extending_the_reach_of_vmotion.htmMORAL:  Be careful before you buy hardware.95
DEMOVMotion
Resource ManagementDataCentersThe boundary of a VI infrastructure (& VMotion)ClustersCollections of chassis resources for centralized managementPools of CPU and Memory, bounded by the individual chassisResource PoolsSub-collections of clusters for distribution of resourcesAllows for carving up of resources and distributing to collections of Virtual Machines
Shares, Reservations, & LimitsSharesIdentifies the percent of resources a VM can consumeOnly used during resource contentionReservationsIdentifies minimum resources used by a particular VMWhat resources must a VM always haveEnsures performance when calculating resource load balancing during resource contentionLimitsIdentifies maximum resources used by a particular VMProtects against resource overuse (spiking)These all factor into DRS cluster automation calculations
CPU & RAM SharesTechMentorClusterDeveloper TrackResource Pool1000 CPU Shares2048G RAMServer TrackResource Pool2000 CPU Shares4096 RAMWMI Class200 CPU Shares512M RAMADSI Class600 CPU Shares784M RAMVMware Class1200 CPU Shares3G RAMBest Free Tools Class800 CPU Shares512M RAM
DEMOControlling Utilization with Shares, Reservations, & Limits
HA FailoverVMware HA must be configured for each Virtual Machine.Enables virtual machines to reboot onto other hosts when a host failure occurs.HA leverages DRS calculations for retargeting.DRS analyzes resource load of the system at an HA event and decides where to restart the failed server.Crashed system will restart on new chassis.Will incur an outage, but that outage will be short.
HA FailoverChassis 1Chassis 2Chassis 3TechMentorClusterRESTARTRESTARTCRASH!RESTART
DRS Load BalancingDRS enables hosts to rebalance their VM load as resource levels change.Enables a much better distribution of resources as virtual machine workloads change over time.DRS is the combination of VMotion +  MathRegularly calculates performance metrics (processor, memory use).Makes recommendations for migrating virtual machines.Five star = Highly recommendedOne star = Not so much
DRS Load BalancingChassis 1Chassis 2Chassis 3TechMentorClusterHOT!
DRS Automation LevelsAdministrator trust is often the decidingfactor in choosing the automation level.
Affinity / Anti-AffinityWithin a DRS cluster, certain machines should remain on the same chassis…E.g., an application server and it’s database serverOthers should never…E.g., two domain controllersUse affinity rules and anti-affinity rules to ensure correct placement of systems during DRS load balancing.Ensure systems aren’t given conflicting rules"Serve the public trust.  Protect the innocent.  Uphold the law.”106
DEMOHA, DRS, and Affinity
Delegated AdministrationGregCluster AdminTomPool AdminJaneVM Admin
VMware Update ManagerThere are perils to unifying all virtual machines under a singular hypervisor.Hypervisor-based attacks obliterate every VM at onceVirtual networks are another problem areaVirtual machines themselves need patchingVMware Update Manager provides unified patching for all ESX hosts and VMsIntegrates with HA and Maintenance Modes to ensure minimal downtime.109
MapsConsidering all the interconnections in your Virtual Infrastructure, a nice map is handy…Automatically generated.  Sparse modification.Maps are fun.
What’s New with vSphere v4.0?VMware Data RecoveryAgentless backup and restore for virtual machines.VMware Fault ToleranceContinuous availability through replication/replay of log files.VMware Hot AddAdd CPU and memory without powering down VMs.VMware Host ProfilesGolden images / Rapid deployment for ESX hosts.More addressable memory, processors, other resourcesTransaction performance boostPartially through code optimizationsPartially through Intel VT-x/EPT & AMD-V/RVI HW extensions.
What’s New with vSphere v4.0?
What’s New with vSphere v4.0?(Some Cautions…)Don’t be overly swayed by VMware’s “Cloud” or “Private Cloud” marketing.vSphere will be recognizably similar to what is available today.“Private Clouds” ==Dynamic workload balancing ==You-don’t-care-where-you’re-VM-is-hosted ==DRS, HA, ESX, VI, etc…Be careful of price points…Be careful of capabilities at each price point…
Introducing Hyper-V:Fast, Cost-Effective VirtualizationGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
Hyper-V’s Positioning
VirtualHard Disks(VHD)Hyper-V & MS VirtualizationHyper-V is a significantly different virtualization architecture than what we saw in Microsoft Virtual Server(thankfully!)VM 2“Child”VM 3“Child”VM 2VM 3VM 1“Parent”Virtual Server 2005 R2Windows Server 2003Hardware           Hyper-V       AMD-V / Intel VT
Hyper-V & MS VirtualizationHyper-V replaces Microsoft Virtual Server as Microsoft’s server virtualization solution.Replaces MVS’s Type-2 virtualization architecture with a Microkernelized Type-1 architecture.Type-1 means that the hypervisor does not rest atop an existing OS instance.  Much faster.Microkernelized means that drivers are not installed into the hypervisor.  This is different than ESX.  More efficient.117
Hyper-V & MS VirtualizationWith “enlightened” VMs Hyper-V leverages paravirtualization:…requires a “specially coded OS”…requires chipset hardware-assist.…mans that drivers are not emulated (“translated”) by the hypervisor.OS is aware it is virtualized and works with the host for performance.The VM’s drivers are actually pointers to the host’s drivers.
Hyper-V & MS VirtualizationGetting to Paravirtualization Requires Installing Additional “Stuff”…Stuff = “Integration Components”Similar to VMware Tools, but at a lower level.ICs include system extensions, time sync, backup, VSS integration, heartbeat, more…W2008/Vista enlightened by defaultXP/2003/Linux require extensions for enlightenmentWithout ICs OSs must use emulation.  Slower.
Hyper-V & MS VirtualizationThe “Primary Partition” owns and has direct access to physical devices.This is effectively “the OS that used to be the only OS on the system”.
The Primary PartitionUsed for managing the system.Can be Full W2008 or Core W2008.Core W2008 requires fewer resources.A smaller primary partition == more resources for VMs.Hosts the memory manager, management APIs, and virtualized I/O devices.With no drivers, Hyper-V’s hypervisor is ~260K as compared to VMware’s 32M++.Smaller == less code == faster == more secure.
Hyper-V “Under the Covers” ArchitecturePrimary PartitionChild PartitionChild PartitionServerServerVSPsVirtualizationServiceProvidersI/OStackI/OStackI/OStackOS Kernel Enlightenments (WS08+)DriversVirtualizationServiceClientsVirtualizationServiceClientsVMBusVMBusVMBusShared MemoryHypervisor						DevicesProcessorsMemoryVSP/VSC pairs work together.  VSC calls VSP for hardware resources.Primary partition is used for management and proxying of hardware calls.Drivers managed by parent partition.“synthetic” vs “emulated”No translation122
Minimums on the MoBoRequirements to support Hyper-V mean that many older servers won’t work.An x64-based processor. Hardware-assisted virtualization.This is available in processors that include a virtualization option; specifically, Intel VT or AMD Virtualization (AMD-V). Hardware Data Execution Protection (DEP) must be available and be enabled.Specifically, you must enable Intel XD bit or AMD NX bit.Note:  You must power off the machine after enabling…123
Installing Hyper-VWindows Server 2008 R2 RTM is for all intensive purposes the minimum OS level you’ll want.Use SecurAble to checkhardware compatibility.http://www.grc.com/securable.htm124
SupportabilityHyper-V can support…Up to 4x vCPUs per VM.Up to 2T RAM per host.  Up to 64G RAM per VM.Up to 8x vNICs per VM.Up to 4x vSCSI Controllers per VM.WSFC cluster support for up to 16 nodes.DAS, FC SAN, or iSCSI support for storing VMsPass-through storage device supportSmart move for high I/O workloadsVSS support for live VM backupsThis is extraordinary.  Provides for crash consistent backups.VHD format, fully compatible with XenSource125
Supported GuestsWindows Server 2008
Windows Server 2008 x86 (VM configured as 1, 2 or 4-way SMP)
Windows Server 2008 x64 (VM configured as 1, 2 or 4-way SMP)
Windows Server 2003
Windows Server 2003 x86 (VMs configured as 1 or 2-way SMP only)
Windows Server 2003 x64 (VMs configured as 1-way only)
Windows Vista
Windows Vista x64 with Service Pack 1 (VMs configured as 1 or 2-way SMP only)
Windows Vista  x86 with Service Pack 1 (VMs configured as 1-way only)
Windows XP
Windows XP x64 with Service Pack 2 (VMs configured as 1or 2-way SMP only)
Windows XP x86 with Service Pack 3 (VMs configured as 1-way only)
Windows XP x86 with Service Pack 2 (VMs configured as 1-way only)
Windows Server 2000
Windows Server 2000 with Service Pack 4 (VMs configured as 1-way only)
SUSE Linux Enterprise Server
SUSE Linux Enterprise Server 10 with Service Pack 1 x86 Edition
SUSE Linux Enterprise Server 10 with Service Pack 1 x64 Edition
SUSE Linux Enterprise Server 10 with Service Pack 2 x86 Edition
SUSE Linux Enterprise Server 10 with Service Pack 2 x64 Edition126
Physical EnvironmentMore processors is betterHost physical RAM (more is better)Minimum 512 GB for primary partition reqt’s +300 MB for Hyper-V reqt’s + Σ (Assigned vRAM/VM + 32 MB +8 MB for each 1 GB RAM over 1GB)Never overload a serverThis relates to both processor utilization and memory.RAM in Hyper-V cannot be shared between VMs.  Thus allocated RAM == actual RAM.This is different than VMware behavior.Plan for expansion.  Plan for failover.  (N+1)127
Hyper-V Console128
Hyper-V and NetworkingNetworking configuration is important for supportability / flexibilityMore NICsis always better.
Hyper-V and NetworkingExternalnetworks connect to the outside world.Internalnetworks operate between VMs and their host only.Private networks connect VMs on the same host
Hyper-V and NetworkingConnect to a physical NIC(Optionally) identify internal VLAN identification131
Formal Guidance in Securing & Auditing the Virtual Environment, Beyond the Physical…Greg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
Four Documents of NoteIn Order of UsefulnessVMware’s VI3.5 Security Hardening GuideHigh-level guidance for security and auditing.The DISA’s STIG for ESX Server & “Virtual Computing”Very specific guidance on security.  Required if DoD-connected.“Virtual Computing” STIG is more general, possibly outdated.CIS’s VMware ESX Server 3.0 BenchmarkThis document is aged, but serves as an additional data point for learning / education on common ESX topics.CIS’s Virtual Machine Security GuidelinesThis document, while also aged, is fairly general in its guidance.
DISA STIG GuidanceRemember that ESX has roots in RHEL v3, specifically(Kernel 2.6.18-128.ESX).Thus, protecting/auditing ESX starts by protecting/auditing RHEL v3.DISA Requirement ESX0010 states:The IAO/SA will configure the ESX Server in accordance with the UNIX STIG and Checklist. This is not applicable to ESX Server 3i.Any ESX Server must first meet DISA’s general UNIX STIG, then also the ESX STIG.
DISA STIG GuidanceOnce met, DISA’s ESX STIG adds nearly 120 individual requirements for modifying / verifying the configuration of that server’s ESX functionality...
DISA STIG GuidanceOnce met, DISA’s ESX STIG adds nearly 120 individual requirements for modifying / verifying the configuration of that server’s ESX functionality...Stepping through these items isn’t value added.  Let’s instead discuss high-level security and auditing requirements.
Guidance for Virtual MachinesSecure virtual machines in the same ways you would physical machines.Updates, A/V, A/M, firewalls.Disable unnecessary functions.OS services, physical devices, screen savers (particularly important).Leverage templates when possibleTemplates ensure that every VM has a common start point, common security/auditing settings.Eases config documentation.
Guidance for Virtual MachinesSet Limits/Reservations to prevent resource overuse.Greg’s Advice:  Be careful with setting too many limits/reservations.Don’t forget host reserve to protect host functions.Isolate VM networks.Physically separate VM interfaces from VMotion & management connection interfaces to prevent data leakage.  Very important.Leverage VLANs if your security policies allow.Use dVSs when possible to reduce configuration error, centralize management of virtual switches.Create isolated management network with high security level.Spec ESX hosts with lots of network cards!
Guidance for VMX File CustomizationDisable Remote Copy/Paste Operations between Guest OS and Remote ConsoleCan be used as vector for data leakage.  Typically unsecured.isolation.tools.copy.disable = TRUEisolation.tools.paste.disable = TRUEisolation.tools.setGUIoptions.disable = FALSEPrevent Log OverflowVM logs to VI datastore can overflow log space. Set rotation size and count of logs to keep.log.rotatesize = 100000log.keepOld = 10
Guidance for VMX File CustomizationDo not permit use of nonpersistent disks.These disks revert back to snapshot when VM is rebooted.Can be used by would-be attacker to cover tracks.Verify in VM settings.Verify that unauthorized devices are not connected.Unnecessary peripherals should not be connected.Prevent user from connecting devices from within the guest OS.floppy<x>.presentserial<x>.presentparallel<x>.presentisolation.tools.connectable.disable = TRUE
Guidance for VMX File CustomizationVerify correct assignment of guest OSWhile not necessarily a security risk, improper guest OS assignment will have an impact on system performance.Verify proper permissions on disk files..VMX files should be 755 (o+rwx, g+rx).VMDK files should be 600 (o+rw)User and group should be root.
Ad

More Related Content

What's hot (20)

PowerShell Remoting
PowerShell RemotingPowerShell Remoting
PowerShell Remoting
Concentrated Technology
 
PS scripting and modularization
PS scripting and modularizationPS scripting and modularization
PS scripting and modularization
Concentrated Technology
 
Prepping software for w7 deployment
Prepping software for w7 deploymentPrepping software for w7 deployment
Prepping software for w7 deployment
Concentrated Technology
 
From VB Script to PowerShell
From VB Script to PowerShellFrom VB Script to PowerShell
From VB Script to PowerShell
Concentrated Technology
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
PowerShell 8tips
PowerShell 8tipsPowerShell 8tips
PowerShell 8tips
Concentrated Technology
 
PowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepointPowerShell crashcourse for sharepoint
PowerShell crashcourse for sharepoint
Concentrated Technology
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
Concentrated Technology
 
K2000 Mac Imaging
K2000 Mac ImagingK2000 Mac Imaging
K2000 Mac Imaging
Dell World
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
solarisyougood
 
No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
Unidesk Corporation
 
Troubleshooting K2000
Troubleshooting K2000Troubleshooting K2000
Troubleshooting K2000
Dell World
 
K2000 Advanced Topics
K2000 Advanced TopicsK2000 Advanced Topics
K2000 Advanced Topics
Dell World
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Jeff Stokes
 
Taking IBM Sametime Mobile
Taking IBM Sametime MobileTaking IBM Sametime Mobile
Taking IBM Sametime Mobile
Gabriella Davis
 
K2000 Imaging
K2000 ImagingK2000 Imaging
K2000 Imaging
Dell World
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
Dell World
 
K2000 Scripted Installations
K2000 Scripted InstallationsK2000 Scripted Installations
K2000 Scripted Installations
Dell World
 
Optimizing K2000 Workflow
Optimizing K2000 WorkflowOptimizing K2000 Workflow
Optimizing K2000 Workflow
Dell World
 
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1 Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Microsoft TechNet - Belgium and Luxembourg
 
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff StokesOptimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Jeff Stokes
 
PowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint adminsPowerShell crashcourse for Sharepoint admins
PowerShell crashcourse for Sharepoint admins
Concentrated Technology
 
K2000 Mac Imaging
K2000 Mac ImagingK2000 Mac Imaging
K2000 Mac Imaging
Dell World
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
solarisyougood
 
No BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering SolutionsNo BS, Vendor Neutral Comparison of Application Layering Solutions
No BS, Vendor Neutral Comparison of Application Layering Solutions
Unidesk Corporation
 
Troubleshooting K2000
Troubleshooting K2000Troubleshooting K2000
Troubleshooting K2000
Dell World
 
K2000 Advanced Topics
K2000 Advanced TopicsK2000 Advanced Topics
K2000 Advanced Topics
Dell World
 
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff StokesAchieving maximum performance in microsoft vdi environments - Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Jeff Stokes
 
Taking IBM Sametime Mobile
Taking IBM Sametime MobileTaking IBM Sametime Mobile
Taking IBM Sametime Mobile
Gabriella Davis
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
Dell World
 
K2000 Scripted Installations
K2000 Scripted InstallationsK2000 Scripted Installations
K2000 Scripted Installations
Dell World
 
Optimizing K2000 Workflow
Optimizing K2000 WorkflowOptimizing K2000 Workflow
Optimizing K2000 Workflow
Dell World
 
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1 Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Inside Windows 8 – Mastering Windows Deployment Services and MDT 2012 Update 1
Microsoft TechNet - Belgium and Luxembourg
 

Similar to Virtualization auditing & security deck v1.0 (20)

ESXpert strategies VMware vSphere
ESXpert strategies VMware vSphereESXpert strategies VMware vSphere
ESXpert strategies VMware vSphere
Concentrated Technology
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
Mercury Solutions
 
Designing virtual infrastructure
Designing virtual infrastructureDesigning virtual infrastructure
Designing virtual infrastructure
Concentrated Technology
 
Virtualising Tier 1 Apps
Virtualising Tier 1 AppsVirtualising Tier 1 Apps
Virtualising Tier 1 Apps
Iwan Rahabok
 
Virtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud ComputingVirtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud Computing
Hitesh Gupta
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
none
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
Wilson Erique
 
Dont Let Inefficient Data Access Undermine Your Virtualization Goals
Dont Let Inefficient Data Access Undermine Your Virtualization GoalsDont Let Inefficient Data Access Undermine Your Virtualization Goals
Dont Let Inefficient Data Access Undermine Your Virtualization Goals
Hammurobbie
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 
Implementing dr w. hyper v clustering
Implementing dr w. hyper v clusteringImplementing dr w. hyper v clustering
Implementing dr w. hyper v clustering
Concentrated Technology
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1
Pini Cohen
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
HTS Hosting
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
HTS Hosting
 
CCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptxCCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptx
SanaLatif13
 
CCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptxCCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptx
SanaLatif13
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
HarbourIT
 
Virtualization 101
Virtualization 101Virtualization 101
Virtualization 101
Gaurav Marwaha
 
15 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 201815 Vmware interview questions & answers 2018
15 Vmware interview questions & answers 2018
Mercury Solutions
 
Virtualising Tier 1 Apps
Virtualising Tier 1 AppsVirtualising Tier 1 Apps
Virtualising Tier 1 Apps
Iwan Rahabok
 
Virtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud ComputingVirtualization using VMWare Workstation and Cloud Computing
Virtualization using VMWare Workstation and Cloud Computing
Hitesh Gupta
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
none
 
Datacenter migration using vmware
Datacenter migration using vmwareDatacenter migration using vmware
Datacenter migration using vmware
Wilson Erique
 
Dont Let Inefficient Data Access Undermine Your Virtualization Goals
Dont Let Inefficient Data Access Undermine Your Virtualization GoalsDont Let Inefficient Data Access Undermine Your Virtualization Goals
Dont Let Inefficient Data Access Undermine Your Virtualization Goals
Hammurobbie
 
Virtualization for Cloud Environment
Virtualization for Cloud EnvironmentVirtualization for Cloud Environment
Virtualization for Cloud Environment
Dr. Sunil Kr. Pandey
 
Virtualization In Software Testing
Virtualization In Software TestingVirtualization In Software Testing
Virtualization In Software Testing
Colloquium
 
Virtualization 2011 v1
Virtualization 2011 v1Virtualization 2011 v1
Virtualization 2011 v1
Pini Cohen
 
Four Main Types of Virtualization
Four Main Types of VirtualizationFour Main Types of Virtualization
Four Main Types of Virtualization
HTS Hosting
 
Risk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized EnvironmentsRisk Analysis and Mitigation in Virtualized Environments
Risk Analysis and Mitigation in Virtualized Environments
Siddharth Coontoor
 
Virtualization
VirtualizationVirtualization
Virtualization
Birju Tank
 
The Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop VirtualizationThe Pros and Cons of Desktop Virtualization
The Pros and Cons of Desktop Virtualization
HTS Hosting
 
CCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptxCCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptx
SanaLatif13
 
CCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptxCCIS - Chapter # 4 - Virtualization.pptx
CCIS - Chapter # 4 - Virtualization.pptx
SanaLatif13
 
Harbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 WrapHarbour IT & VMware - vForum 2010 Wrap
Harbour IT & VMware - vForum 2010 Wrap
HarbourIT
 
Ad

More from Concentrated Technology (14)

Securely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rdsSecurely connecting to apps over the internet using rds
Securely connecting to apps over the internet using rds
Concentrated Technology
 
PS error handling and debugging
PS error handling and debuggingPS error handling and debugging
PS error handling and debugging
Concentrated Technology
 
PowerShell crashcourse
PowerShell crashcoursePowerShell crashcourse
PowerShell crashcourse
Concentrated Technology
 
PowerShell custom properties
PowerShell custom propertiesPowerShell custom properties
PowerShell custom properties
Concentrated Technology
 
PowerShell crash course
PowerShell crash coursePowerShell crash course
PowerShell crash course
Concentrated Technology
 
PowerShell and WMI
PowerShell and WMIPowerShell and WMI
PowerShell and WMI
Concentrated Technology
 
No-script PowerShell v2
No-script PowerShell v2No-script PowerShell v2
No-script PowerShell v2
Concentrated Technology
 
Managing SQLserver
Managing SQLserverManaging SQLserver
Managing SQLserver
Concentrated Technology
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
Concentrated Technology
 
Managing enterprise with PowerShell remoting
Managing enterprise with PowerShell remotingManaging enterprise with PowerShell remoting
Managing enterprise with PowerShell remoting
Concentrated Technology
 
Inventory your network and clients with PowerShell
Inventory your network and clients with PowerShellInventory your network and clients with PowerShell
Inventory your network and clients with PowerShell
Concentrated Technology
 
Iis implementation
Iis implementationIis implementation
Iis implementation
Concentrated Technology
 
Hyper v r2 deep dive
Hyper v r2 deep diveHyper v r2 deep dive
Hyper v r2 deep dive
Concentrated Technology
 
How to configure esx to pass an audit
How to configure esx to pass an auditHow to configure esx to pass an audit
How to configure esx to pass an audit
Concentrated Technology
 
Ad

Recently uploaded (20)

2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Asthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdfAsthma presentación en inglés abril 2025 pdf
Asthma presentación en inglés abril 2025 pdf
VanessaRaudez
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Hands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordDataHands On: Create a Lightning Aura Component with force:RecordData
Hands On: Create a Lightning Aura Component with force:RecordData
Lynda Kane
 
"PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System""PHP and MySQL CRUD Operations for Student Management System"
"PHP and MySQL CRUD Operations for Student Management System"
Jainul Musani
 
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from AnywhereAutomation Hour 1/28/2022: Capture User Feedback from Anywhere
Automation Hour 1/28/2022: Capture User Feedback from Anywhere
Lynda Kane
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
AI Changes Everything – Talk at Cardiff Metropolitan University, 29th April 2...
Alan Dix
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
 
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Enhancing ICU Intelligence: How Our Functional Testing Enabled a Healthcare I...
Impelsys Inc.
 
Automation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From AnywhereAutomation Dreamin': Capture User Feedback From Anywhere
Automation Dreamin': Capture User Feedback From Anywhere
Lynda Kane
 
What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...What is Model Context Protocol(MCP) - The new technology for communication bw...
What is Model Context Protocol(MCP) - The new technology for communication bw...
Vishnu Singh Chundawat
 

Virtualization auditing & security deck v1.0

  • 1. Understanding Virtualization’s Role in Auditing and SecurityGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 2. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC
  • 3. Who Am I?Greg Shields, MVP, vExpertNearly 15 years of Windows administration and engineering experience.Consultant – Multiple engagements all across the countryConference speaker – TechMentor, Windows Connections, MMS, Tech Ed, ISACA, FOSE, VMworld, Tech TrifectaAuthor – Eleven books, including The Shortcut Guide to Implementing Virtualization in the Small Environment, The Shortcut Guide to Virtualization & Service Automation, and The Shortcut Guide to Selecting the Right Virtualization SolutionColumnist – TechNet Magazine, IT EXPERT Magazine, Redmond Magazine, Virtualization Review Magazine, MCPmag.comVideo Trainer – CBT Nuggets, including video series’ on Hyper-V, ESX 3.5, and vSphereBlogger – www.concentratedtech.comAll-around good guy…
  • 4. Who is Concentrated Technology?A collaboration between IT gurus Greg Shields andDon Jones, www.ConcentratedTech.com is a place for concise, helpful IT news and education.Our emphasis is on concise…We believe in the open sharing of our slide decks.Couldn’t make Tech Ed?No time for VMworld?We hit them all, and want to share them with you…If you’re interested in these slides, as well as every other deckwe’ve presented this year……at the end of the session today, let’s trade email addresses. We’ll add you to our newsletter list.4
  • 5. 4½ Modules to Virtual Excellence…Module 0: So…What is Virtualization?Module 1: The Seven Elements of a Successful Virtualization ArchitectureModule 2: Understanding the Technologies Behind VMware vSphere VirtualizationLunch!Module 3: Understanding the Technologies Behind Hyper-V VirtualizationModule 4: Formal Guidance in Securing & Auditing the vSphere Environment, Beyond the Physical
  • 6. So, What is Virtualization?Virtualization:Virtualization is involved with the abstraction of computer resources.Virtualization decouples physical hardware from installed operating systems.Leverages a “hypervisor” layer that is installed directly atop physical hardware.This hypervisor abstracts physical resources to create a unified platform upon which all virtual machines reside.6
  • 7. So, What is Virtualization?Virtualization:Virtualization is involved with the abstraction of computer resources.Virtualization decouples physical hardware from installed operating systems.Leverages a “hypervisor” layer that is installed directly atop physical hardware.This hypervisor abstracts physical resources to create a unified platform upon which all virtual machines reside.Think of virtualization as a “shim” betweenthe physical hardware and the virtual machine7
  • 8. What Virtualization DoesEntire System VirtualizationVirtualizes the “Core Four”MemoryProcessorNetwork CardDisk
  • 9. What Virtualization DoesMemorySystem memory shared between the host system and the VM’s.VM memory is not addressable by the system and vice versa.ProcessorProcesses in the virtual machines run on the host.The host distributes requests among available physical processors.Network CardVirtual network cards share available physical network cards.Virtual network cards can communicate privately with other VM’s or can route to the external network.Ability to create internal virtual networks.DiskVirtual disks exist as a series of files on the host.
  • 10. What Virtualization DoesMemorySystem memory shared between the host system and the VM’s.VM memory is not addressable by the system and vice versa.ProcessorProcesses in the virtual machines run on the host.The host distributes requests among available physical processors.Network CardVirtual network cards share available physical network cards.Virtual network cards can communicate privately with other VM’s or can route to the external network.Ability to create internal virtual networks.DiskVirtual disks exist as a series of files on the host.So, a virtual machine is just a FILE.Files are morePortable, Restorable, and Manageable.
  • 11. The ApproachVirtualization…Breaks hardware dependencies – all virtual hardware is the same!Provides security outside the OS context.Allows multiple servers to run on one host server.ApplicationApplicationApplicationApplicationApplicationApplicationApplicationApplicationApplicationOSOSOSOSOSOSOSOSOSVirtual MachineVirtual MachineVirtual MachineVirtual MachineVirtual MachineVirtual MachineHardwareHardwareHardwareHardware
  • 12. What it Does Not DoDiscernibly change the operating or Operating System environmentDual-boot or dual-partition the host’s diskAllow you to drop all your servers onto a single host serverConstrained by available Processors & RAMVirtualize everything in the server roomNot a panacea!Specific candidates must be identified for virtualization
  • 13. What Problems Does this Solve?Disaster Recovery“Replicating my data to an off-site location is great. But, if the applications that use that data are unavailable, I’m still down.”Server Consolidation“My Data Center is currently at 103% capacity in space/power/cooling. The incremental cost for more is prohibitive compared to consolidating my servers.”Rapid Deployment“It takes 20 hours to provision a server from cardboard to server rack. I need this done in less than 2 hours.”
  • 14. What Problems Does this Solve?Systems Commonality“I have five different server types. Sometimes when I patch or update my systems, they crash. I don’t have time to regression test against all my hardware types.”Dev/Test“I am building a software application and need to create separate testing environments. I need to be able to completely rebuild these environments in a matter of hours to support various tests.”IT Testing/Patching“Before I deploy Microsoft’s monthly patches to my servers, I need to fully test these patches against exact duplicates all my server configurations.”
  • 15. Hard Cost Savings – Power/CoolingXcel Energy customers pay 8.5¢ per kWh. A low-end, lightly used Windows Server consumes 295W of electricity. Over a one-year period, these ten servers will cost $2,190 to power.A high-end, heavily-used Windows Server running 10 virtual servers consumes 351W of electricity. Over a one-year period, these ten virtual servers will cost $261 to power.
  • 16. Hard Cost Savings – Server RefreshAn low-end Windows Server can cost $4,500. The median salary for a Sr. NT Systems Administrator in the Rocky Mountain Region is $45. At 20 hours per physical server to provision from cardboard to rack, the opportunity cost is $900. Replacing 10 end-of-life machines will cost $54,000.A virtualization-capable Windows Server can cost $15,000. At 20 hours per physical server to provision from cardboard to rack, opportunity cost is $900.At 2 hours per virtual server to provision, opportunity cost per server is $90. Replacing 10 end-of-life machines will cost $16,800.
  • 17. Soft Cost SavingsOpportunity cost incurred when system resource overuse causes effective DoS and administrators unable to spin up additional hardware fast enough.Real cost of lost revenue immediately after DR event when users cannot access necessary data and applications.Low-use servers incur opportunity cost in terms of dollars per useful processor cycle. Servers at 3% to 5% utilized are wasting processor cycles on System Idle Process.Risk (and associated cost) of system crash incurred during patch/update operations on untested hardware or non-uniform hardware.
  • 18. A Visual Cost JustificationSmall Server$4,5001:1$4,500 per Server8:1Large Server$15,000$20,000$2,500 per Server20:1$1,33315:1$1,000Virtualization$5,000Large MarginalCost Increases perAdditional Server+ Power+ Cooling+ Provisioning LaborSmaller Marginal Cost Increases
  • 19. The Seven Elements of a Successful Virtualization ArchitectureGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 20. 44% of Virtualization Deployments FailAccording to a CA announcement from 2007.Inability to quantify ROIInsufficient administrator trainingExpectations not aligned with resultsSuccess =Measure performanceDiligent inventoryLoad DistributionThorough Investigation of Technology
  • 21. 55% Experience More Problems than Benefits with VirtualizationAccording to an Interop survey in May, 2009.Lack of visibilityLack of tools to troubleshoot performance problemsInsufficient education on virtual infrastructure softwareStatistics:27% could not visualize / manage performance25% cite training shortfalls21% unable to secure the infrastructure50% say that implementation costs are too high
  • 22. The Seven Elements…Step -1: Hype Recognition & EducationStep 0: AssessmentStep 1: Purchase & ImplementationStep 2: P2VStep 3: High AvailabilityStep 4: Backups ExpansionStep 5: Virtualization at the DesktopStep 6: DR Implementation
  • 24. The Virtualization AssessmentSuccessful rollouts need a virtualization assessment.You must analyze your environment before you act.Virtualization assessment should include:Inventory of serversInventory of attached peripheralsPerformance characteristics of serversAnalysis of performance characteristicsAnalysis of hardware needs to support virtualized serversBackups AnalysisDisaster Recovery Analysis (Hot vs. warm vs. cold)Initial virtual resource assignment suggestions
  • 25. Easy Candidates for VirtualizationLow processor utilizationLow memory requirementsWe too often add too much RAM in a server.Low context switchesInfrastructure serversRedundant or warm-spare serversOccasional- or limited-use serversSystems where many partially-trusted people need console access
  • 26. Not Candidates for VirtualizationHigh and constant processor / memory utilizationHigh context switchesAttached peripheralsSerial / parallel / USB / External SCSI /License Keyfobs / Scanners / Bar Code ReadersVery high network useGigabit networking requirementsSpecialized hardware requirementsHardware appliances / Pre-built / Unique configsTerminal Servers!…at least with today’s technology…
  • 27. Performance is Job OneIn the early days of virtualization, we used to say…“Exchange Servers can’t be virtualized”“Terminal Servers can’t be virtualized”“You’ll never virtualize a SQL box”Today’s common knowledge is that the decision relates entirely to performance.Thus, before you can determine which servers to virtualize you must understand their performance.Measure that performance over time.Compile results into reports and look for deviations from nominal activity.
  • 29. Useful Performance CountersThese are starting points.Your actual thresholds may be different.
  • 31. The Virtualization AssessmentRelatively Low Processor Use,but…
  • 32. The Virtualization AssessmentHigh Memory Pages/secCrazy High Context Switches & ThreadsRidiculous% Disk Time
  • 33. Gathering PerformancePerfMon is the only mechanism that can gather these statistics from servers.But PerfMon is ridiculouslychallenging to use.Other products assist...Microsoft Assessment & Planning Solution AcceleratorVMware Consolidation & Capacity PlannerPlatespinPowerReconCiRBA
  • 34. Step 1Purchase & Implementation
  • 35. Three Types of VirtualizationEntire System VirtualizationVMwareMicrosoft Virtual ServerOS VirtualizationParallels VirtuozzoParavirtualizationMicrosoft Hyper-VXen / Citrix XenSourceVirtual O/S is entire system.No awarenessof underlying host system.OS instances are “deltas”of the host configuration.Similar to HardwareVirtualization, but Virtual O/Sis “aware” it is virtualized.
  • 36. Hardware VirtualizationESX / vSphereHybrid hypervisor and host OSDevice drivers in the hypervisorEmulation (translation from emulated driver to real driver)High cost, high availability, high performance
  • 37. ParavirtualizationHyper-V, Xen, Citrix XenSourceHost OS becomes primary partition above hypervisor.Device drivers in the primary partitionParavirtualization (no emulation for “enlightened” VMs)Low cost, moderate-to-high availability, high performance
  • 38. Hardware VirtualizationMicrosoft Virtual ServerHypervisor above host OS. Installed to host OS.Device drivers in hypervisorEmulation (translation from emulated driver to real driver)Low cost, low availability, low performance
  • 39. OS VirtualizationParallels VirtuozzoEach VM is comprised of the host config + deltas.No traditional hypervisor. V-layer processes requests.All real device drivers hosted on host OSModerate cost, moderate availability, very high perf.
  • 41. P2V, A Tool, A ProcessAfter environment stand-up, P2V process converts physical machines to virtual ones.A “ghost” + a “driver injection”Numerous applications can do this in one step.SCVMM, Converter, 3rd PartiesThese days, P2V process is commodity.Everyone has their own version.Some are faster. Some muchslower.Paid options == faster.
  • 42. P2V, A Tool, A Process
  • 43. P2V, P2V-DRP2VPhysical 2 Virtual machine conversionA tool as well as a processSCVMM, VMware VI/Converter, Acronis, Leostream, others.P2V-DRSimilar to P2V, but with interim step of image creation/storage.“Poor-man’s DR”
  • 44. P2V-DR UsesP2V-DR can be leveraged for medium-term storage of server imagesUseful when DR site does not have hot backup capability or requirementsRegularly create images of physical servers, but only store those images rather than load to virtual environmentCheaper-to-maintain DR environmentNot fast.Not easy.Not completely reliable.…but essentially cost-free.
  • 46. What Really is High Availability?Part 1: Protection from Host Failures
  • 47. What Really is High Availability?Part 2: Load Balancing of VM/host Resources
  • 48. Costs vs. BenefitsHigh-availability adds dramatically greater uptime for virtual machines.Protection against host failuresProtection against resource overuseProtection against scheduled/unscheduled downtimeHigh-availability also adds much greater cost…Shared storage between hostsConnectivityHigher (and more expensive) software editionsNot every environment needs HA!
  • 49. Common Features in High-End PlatformsLive migration enables running virtual machines to be moved to an alternate host before a host failure.Automated relocation to new hardware and restart of virtual machines immediately upon a host failure.Load balancing calculations that manually or automatically re-balance running virtual machines across hosts to prevent resource contention.Disk storage migration that enables the zero-impact relocation of virtual machine disk files to alternate storage.Automated replication features that copy backed up virtual machines to alternate locations for disaster recovery purposes.
  • 51. Backup TerminologyFile-Level BackupBackup Agent in the Virtual MachineBlock-Level BackupBackup Agent on the Virtual HostQuiescenceQuieting the file system to prep for a backupO/S Crash ConsistencyCapability for post-restore O/S functionalityApplication Crash ConsistencyCapability for post-restore application functionality
  • 52. Four Types of BackupsBacking up the host systemMay be necessary to maintain host configurationBut often, not completely necessaryThe fastest fix for a broken host is often a complete rebuildBacking up Virtual Disk FilesFast and can be done from a single host-based backup clientChallenging to do file-level restoreBacking up VMs from inside the VMSlower and requires backup clients in every VM.Resource intensive on hostCapable of doing file-level restoresBack up VMs from the storage perspectiveLeverage storage frame utilities to complete the backup.
  • 53. Four Types of Backups
  • 54. The Problem with Transactional DatabasesO/S Crash Consistency is easy to obtain.Just quiesce the file system before beginning the backup.Application Crash Consistency much harder.Transactional databases like AD, Exchange, SQL don’t quiesce when the file system does.Need to stop these databases before quiescing.Or, need an agent in the VM that handles DB quiescing.Restoration without crash consistency will lose data.DB restores into “inconsistent” state.
  • 55. The Problem with Transactional DatabasesFor VMs, must consider file-level backups and block-level backups.“Top-down” vs. “Bottom-up”File-level backups provide individual file restorabilityFile-level backups provide transactional database crash consistency.Block-level backups provide whole-server restorability.Not all block-level backups provide app crash consistency.Windows VSS can quiesce apps prior to snapping a backup.Advantage: Hyper-V!
  • 56. Four-Step Process for VSSStep 1: A requestor, such as backup software, requests the server to invoke a shadow copy.Step 2: A provider accepts the request and calls an application-specific provider (SQL, Exchange, etc.) if necessary.Step 3: Application-specific provider coordinates system shadow copy with app quiescence to ensure application consistency.Step 4: Shadow copy is created.…then the backup starts…56
  • 58. Desktop Virtualization = VDI = Hosted DesktopsOnce you fully embrace virtualization for your servers, desktop are a next common focus.VDI is all about the apps.HOWEVER, BEWARE VDI!VDI is a much more complex beast than Terminal Services, Citrix XenApp, or other presentation virtualization platforms.It is also dramatically more expensive.Potential VDI’s Use CasesApplications that simply don’t work atop RDS/CitrixHigh-utilization apps that require remote accessPeripherals
  • 60. Disaster RecoveryWhat is Disaster Recovery?Disaster Recovery intends to provide continuity of business services after a critical event.Disaster Recovery is invoked after the large-scale loss of primary business services.DR is not the restoration of a critical server.DR is not the restoration of a critical business service.Why the distinction?DR solutions do not resolve daily operational issues.Often, failback is challenging.
  • 61. DR, meet Virtualization…Early all-physical attempts at DR were cost-prohibitive and operationally complex.Identical server inventory at primary and backup site.Management cost of identical server configuration. Change management costs prohibitive.Virtualization eliminates many previous barriers.Virtual servers are chassis independent.Image-level backup == image-level restore.Hot sites become only one of many options – cold & warm sites.Numerous cost-effective solutions available.Don’t believe the hype.Make decisions based on need.
  • 62. DR, meet Virtualization…With virtualization,DR becomes little morethan……the regularly scheduledblock-level backup ofvirtual servers.…the relocation of thosebackups to an alternatelocation.…the powering on of thosevirtual machines after adisaster.
  • 63. DR, meet Virtualization…So, what do you need?…a backup site.…alternate servers and a virtual platform.…VM-aware (and VSS-aware) backup software.…a replication mechanism.
  • 65. Four General DR Tiers$$$$$$$$$$
  • 66. Four General DR Tiers$ - Snap & PrayLeverage no-cost or low-cost tools to snapshot image-level backups of VM’s.Cold site and replacement equipment on retainer.Store images to tape. Rotate tapes off-site.Restoration:Activate cold siteProcure reserved replacement equipmentProcure tapes and tape deviceRestore images to replacement equipmentResolve database (and some O/S) inconsistencies
  • 67. Four General DR Tiers$$ - Warm SnapLeverage no-cost or low-cost tools to create image-level backups of VM’s.Connected warm site with data storage location.Transfer images to off-site data storage locationRestoration:Procure or spin up reserved replacement equipmentRestore images from data storage to replacement equipmentResolve database (and some O/S) inconsistenciesDisk-to-disk backups over the WAN increase backup time, but significantly reduce restore time.67
  • 68. Four General DR Tiers$$$ - Inconsistent SAN-to-SANWarm site. Both sites using SAN. SAN-to-SAN replication instantiated between sites.SAN data is automatically replicated to remote site.Greater support for incrementals. Less WAN usage.Restoration:Procure or spin up reserved replacement equipmentAttach virtual machines to replacement equipment and hit the “green VCR button”.Resolve database (and some O/S) inconsistenciesSAN replication is often not aware of quiescence, so this solution can be problematic.68
  • 69. Four General DR Tiers$$$$ - Real-time ReplicationWarm or hot site. Both sites using SAN. SAN-to-SAN replication instantiated between sites.3rd Party tools used for image-to-image transfer.In-VM for transactional database quiescing.On-host for all other machines.Roll-back and roll-forward capabilitiesRestoration:Hit the “green VCR button”(or, auto-failover…)
  • 70. Understanding the Technologies Behind VMware vSphereGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 71. What VMware DoesVirtualizes the Core FourMemoryProcessorNICDisk
  • 72. The VMware Suite of ProductsVMware PlayerVMware WorkstationVMware ServerVMware ESX / vSphereVMware SRMVmwareThinAppVMware Lab ManagerIncreasing CostDecreasing SupportIncreasing Reliability
  • 73. VMware vSphereAn OS all unto itself.Leverages a highly-customized RHEL v3 (Kernel 2.6.18-128.ESX) instance for its management partition. ESXi eliminates the RHEL instance in favor of a proprietary VMware management partition. Smaller.VMware suggests RHEL may be going away completely in future versions.A file system all unto itself.VMFS file system extremely efficient.Specially designed to handle...…extremely large files…multiple simultaneous server access…high disk utilization.
  • 74. VMware vSphereVery specific hardware and O/S requirementsVMware’s use of drivers in the hypervisor means a small HCL for hardware.If your hardware is not on the VMware supportability matrix, ESX simply won’t load.More limited VM compatibilityDue to concerns about reliability. Higher testing standards.Fewer OSs than other versions.Yet “the OSs you’ll want” are all available.Expensive in up-front costs, but can be less expensive in total cost per deployed server.
  • 78. Storage RequirementsYour choice of storage is incredibly important…VM processing highly dependant on rotation speed.Higher-quality storage = better experience, better scalabilityMust architect disk space to fit……the ESX server O/S and software…the full size of every concurrent VM…additional space for VM migration…snapshots…growth
  • 79. ESX Supportability MatrixCritical: Validate that your hardware is on the ESX HCL.Early ESX versions had limited support for hardware. That support has grown to over 100 server vendors.Detailed information on supported hardware, storage, & IO can be found at:http://www.vmware.com/pdf/esx_systems_guide.pdfVerify CPU vendor, name, stepping, and chipset.Verify NIC, storage, iSCSI, graphics, FC HBA79
  • 80. ESX User InterfacesVirtual Infrastructure ClientWhere most of the action happensClient/server app where most management occursService ConsoleThe host’s console screen itself“The Linux part”, typically accessed via SSHESXi has proprietary console (slow, limited functionality)Used less in ESX 3.x than in any previous versionRemote ConsoleRemote access to each VM’s console screenTcp/901Not intended to be a “thin” interface like Terminal Services
  • 81. Networking & Virtual SwitchesVirtual Switches allow for rich intra-ESX network manipulation…Between two hosts on the same boxBetween a host and the “outside world”For the service console and VI ClientFor IP-based storageSupports complex networking arrangementsVLAN’s and security policiesTraffic shapingNIC teaming
  • 85. Distributed Virtual SwitchesVirtual switches are host-dependent.When virtual machines VMotion, one must hope that the target virtual switch is correctly configured.Virtual switches are Layer 2 devices.No capacity for ACLing traffic between virtual machines on the same host.Virtual machines can collocate in inappropriate ways, which eliminates network protections.Distributed Virtual Switches create a “GIANT SWITCH” across an entire vCenter infrastructure.No longer host dependent, dVSs are managed by vCenter.Support for Private VLANs (PVLANs), virtualized DMZs.Available natively in vSphere, Cisco Nexus 1000V is 3rd party solution that adds more capabilities.
  • 86. New Networking Features in 4.0VMDirectPath – Adds ability to connect VMs directly to physical NICs.40Gbps output per ESX/ESXi host – Improves raw performance across teamed connections.VMXNET3 – A new paravirtualized network driver for added performance.MTU Exposure – Admins can adjust MTU sizes.CDP Support – Support for Cisco Discovery Protocol, aids in network mapping within an ESX host.VLAN Trunking– Now able to trunk VLANs directly to VMs as opposed to terminating at the host boundary.
  • 87. Storage OptionsESX can work with many types of storage.DASFibre ChannelWith attached HBAiSCSI SAN-attachedUsing both hardware and software initiatorsNAS & NFS-based storageCreates low-performance VMFS partitions on Unix/Linux NFS shares or SFU-proxied Windows CIFS sharesGrowing in use.Make sure to disable the ESX firewall for iSCSI and NFS connections!
  • 88. DEMOViewing ESX Host Configurations
  • 89. Virtual InfrastructureESXThe server that does the virtualizationvCenterComprised of vCenter Server, database, and license serverVirtual Infrastructure client connects to VC server and VI database.Heavy reliance on DNSEarly suggestions recommended non-virtualizedserver as VC server. Today, virtualized VC servers are common.Light resource use on VC server
  • 92. P2V & ConsolidationPhysical to Virtual machine conversionEssentially a “ghost” + a “driver injection”Enabled through VMware Converter toolThe Converter Plugin must be installed and Enabled first.Import Machine…VMware Consolidationextends P2V byanalyzing physicalcomputers forperformance andmakingrecommendations.
  • 93. VMotioningCold migration vs. hot migrationVM is powered off for cold migrationVM is powered on for hot migrationAll migrations leverage VMotion interface unless one is not assigned.Then, all migrations use service console interfaceVMotion interface is not automatically createdEnsure network connectivity and DNS resolution at target chassisEspecially during cross-site DR migrations.
  • 94. Processor Gotcha’sBe aware of processor gotcha’s for VMotioning!Can VMotion between processors of different speeds, cache sizes, and number of cores.However, cannot VMotion between different processor classesIntel to AMD, AMD to IntelP3 to P4, P4 to P3, “all-the-other-combinations”Intel’s XD and AMD’s NX bit are functionally similar, but not compatibleEnhanced VMotion Compatibility improves the range of cross-processor VMotion capabilitiesHandles processor instruction masking for youMORAL: Be careful before you buy hardware.94
  • 95. Processor Gotcha’sVMotion CPU Compatibility for Intel processors:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1991VMotion CPU Compatibility for AMD processors:http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1992Unsupported mechanism for manually masking processor instructionshttp://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1993http://www.realtime-windowsserver.com/podcast/2007/06/extending_the_reach_of_vmotion.htmMORAL: Be careful before you buy hardware.95
  • 97. Resource ManagementDataCentersThe boundary of a VI infrastructure (& VMotion)ClustersCollections of chassis resources for centralized managementPools of CPU and Memory, bounded by the individual chassisResource PoolsSub-collections of clusters for distribution of resourcesAllows for carving up of resources and distributing to collections of Virtual Machines
  • 98. Shares, Reservations, & LimitsSharesIdentifies the percent of resources a VM can consumeOnly used during resource contentionReservationsIdentifies minimum resources used by a particular VMWhat resources must a VM always haveEnsures performance when calculating resource load balancing during resource contentionLimitsIdentifies maximum resources used by a particular VMProtects against resource overuse (spiking)These all factor into DRS cluster automation calculations
  • 99. CPU & RAM SharesTechMentorClusterDeveloper TrackResource Pool1000 CPU Shares2048G RAMServer TrackResource Pool2000 CPU Shares4096 RAMWMI Class200 CPU Shares512M RAMADSI Class600 CPU Shares784M RAMVMware Class1200 CPU Shares3G RAMBest Free Tools Class800 CPU Shares512M RAM
  • 100. DEMOControlling Utilization with Shares, Reservations, & Limits
  • 101. HA FailoverVMware HA must be configured for each Virtual Machine.Enables virtual machines to reboot onto other hosts when a host failure occurs.HA leverages DRS calculations for retargeting.DRS analyzes resource load of the system at an HA event and decides where to restart the failed server.Crashed system will restart on new chassis.Will incur an outage, but that outage will be short.
  • 102. HA FailoverChassis 1Chassis 2Chassis 3TechMentorClusterRESTARTRESTARTCRASH!RESTART
  • 103. DRS Load BalancingDRS enables hosts to rebalance their VM load as resource levels change.Enables a much better distribution of resources as virtual machine workloads change over time.DRS is the combination of VMotion + MathRegularly calculates performance metrics (processor, memory use).Makes recommendations for migrating virtual machines.Five star = Highly recommendedOne star = Not so much
  • 104. DRS Load BalancingChassis 1Chassis 2Chassis 3TechMentorClusterHOT!
  • 105. DRS Automation LevelsAdministrator trust is often the decidingfactor in choosing the automation level.
  • 106. Affinity / Anti-AffinityWithin a DRS cluster, certain machines should remain on the same chassis…E.g., an application server and it’s database serverOthers should never…E.g., two domain controllersUse affinity rules and anti-affinity rules to ensure correct placement of systems during DRS load balancing.Ensure systems aren’t given conflicting rules"Serve the public trust. Protect the innocent. Uphold the law.”106
  • 107. DEMOHA, DRS, and Affinity
  • 109. VMware Update ManagerThere are perils to unifying all virtual machines under a singular hypervisor.Hypervisor-based attacks obliterate every VM at onceVirtual networks are another problem areaVirtual machines themselves need patchingVMware Update Manager provides unified patching for all ESX hosts and VMsIntegrates with HA and Maintenance Modes to ensure minimal downtime.109
  • 110. MapsConsidering all the interconnections in your Virtual Infrastructure, a nice map is handy…Automatically generated. Sparse modification.Maps are fun.
  • 111. What’s New with vSphere v4.0?VMware Data RecoveryAgentless backup and restore for virtual machines.VMware Fault ToleranceContinuous availability through replication/replay of log files.VMware Hot AddAdd CPU and memory without powering down VMs.VMware Host ProfilesGolden images / Rapid deployment for ESX hosts.More addressable memory, processors, other resourcesTransaction performance boostPartially through code optimizationsPartially through Intel VT-x/EPT & AMD-V/RVI HW extensions.
  • 112. What’s New with vSphere v4.0?
  • 113. What’s New with vSphere v4.0?(Some Cautions…)Don’t be overly swayed by VMware’s “Cloud” or “Private Cloud” marketing.vSphere will be recognizably similar to what is available today.“Private Clouds” ==Dynamic workload balancing ==You-don’t-care-where-you’re-VM-is-hosted ==DRS, HA, ESX, VI, etc…Be careful of price points…Be careful of capabilities at each price point…
  • 114. Introducing Hyper-V:Fast, Cost-Effective VirtualizationGreg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 116. VirtualHard Disks(VHD)Hyper-V & MS VirtualizationHyper-V is a significantly different virtualization architecture than what we saw in Microsoft Virtual Server(thankfully!)VM 2“Child”VM 3“Child”VM 2VM 3VM 1“Parent”Virtual Server 2005 R2Windows Server 2003Hardware Hyper-V AMD-V / Intel VT
  • 117. Hyper-V & MS VirtualizationHyper-V replaces Microsoft Virtual Server as Microsoft’s server virtualization solution.Replaces MVS’s Type-2 virtualization architecture with a Microkernelized Type-1 architecture.Type-1 means that the hypervisor does not rest atop an existing OS instance. Much faster.Microkernelized means that drivers are not installed into the hypervisor. This is different than ESX. More efficient.117
  • 118. Hyper-V & MS VirtualizationWith “enlightened” VMs Hyper-V leverages paravirtualization:…requires a “specially coded OS”…requires chipset hardware-assist.…mans that drivers are not emulated (“translated”) by the hypervisor.OS is aware it is virtualized and works with the host for performance.The VM’s drivers are actually pointers to the host’s drivers.
  • 119. Hyper-V & MS VirtualizationGetting to Paravirtualization Requires Installing Additional “Stuff”…Stuff = “Integration Components”Similar to VMware Tools, but at a lower level.ICs include system extensions, time sync, backup, VSS integration, heartbeat, more…W2008/Vista enlightened by defaultXP/2003/Linux require extensions for enlightenmentWithout ICs OSs must use emulation. Slower.
  • 120. Hyper-V & MS VirtualizationThe “Primary Partition” owns and has direct access to physical devices.This is effectively “the OS that used to be the only OS on the system”.
  • 121. The Primary PartitionUsed for managing the system.Can be Full W2008 or Core W2008.Core W2008 requires fewer resources.A smaller primary partition == more resources for VMs.Hosts the memory manager, management APIs, and virtualized I/O devices.With no drivers, Hyper-V’s hypervisor is ~260K as compared to VMware’s 32M++.Smaller == less code == faster == more secure.
  • 122. Hyper-V “Under the Covers” ArchitecturePrimary PartitionChild PartitionChild PartitionServerServerVSPsVirtualizationServiceProvidersI/OStackI/OStackI/OStackOS Kernel Enlightenments (WS08+)DriversVirtualizationServiceClientsVirtualizationServiceClientsVMBusVMBusVMBusShared MemoryHypervisor DevicesProcessorsMemoryVSP/VSC pairs work together. VSC calls VSP for hardware resources.Primary partition is used for management and proxying of hardware calls.Drivers managed by parent partition.“synthetic” vs “emulated”No translation122
  • 123. Minimums on the MoBoRequirements to support Hyper-V mean that many older servers won’t work.An x64-based processor. Hardware-assisted virtualization.This is available in processors that include a virtualization option; specifically, Intel VT or AMD Virtualization (AMD-V). Hardware Data Execution Protection (DEP) must be available and be enabled.Specifically, you must enable Intel XD bit or AMD NX bit.Note: You must power off the machine after enabling…123
  • 124. Installing Hyper-VWindows Server 2008 R2 RTM is for all intensive purposes the minimum OS level you’ll want.Use SecurAble to checkhardware compatibility.http://www.grc.com/securable.htm124
  • 125. SupportabilityHyper-V can support…Up to 4x vCPUs per VM.Up to 2T RAM per host. Up to 64G RAM per VM.Up to 8x vNICs per VM.Up to 4x vSCSI Controllers per VM.WSFC cluster support for up to 16 nodes.DAS, FC SAN, or iSCSI support for storing VMsPass-through storage device supportSmart move for high I/O workloadsVSS support for live VM backupsThis is extraordinary. Provides for crash consistent backups.VHD format, fully compatible with XenSource125
  • 127. Windows Server 2008 x86 (VM configured as 1, 2 or 4-way SMP)
  • 128. Windows Server 2008 x64 (VM configured as 1, 2 or 4-way SMP)
  • 130. Windows Server 2003 x86 (VMs configured as 1 or 2-way SMP only)
  • 131. Windows Server 2003 x64 (VMs configured as 1-way only)
  • 133. Windows Vista x64 with Service Pack 1 (VMs configured as 1 or 2-way SMP only)
  • 134. Windows Vista  x86 with Service Pack 1 (VMs configured as 1-way only)
  • 136. Windows XP x64 with Service Pack 2 (VMs configured as 1or 2-way SMP only)
  • 137. Windows XP x86 with Service Pack 3 (VMs configured as 1-way only)
  • 138. Windows XP x86 with Service Pack 2 (VMs configured as 1-way only)
  • 140. Windows Server 2000 with Service Pack 4 (VMs configured as 1-way only)
  • 142. SUSE Linux Enterprise Server 10 with Service Pack 1 x86 Edition
  • 143. SUSE Linux Enterprise Server 10 with Service Pack 1 x64 Edition
  • 144. SUSE Linux Enterprise Server 10 with Service Pack 2 x86 Edition
  • 145. SUSE Linux Enterprise Server 10 with Service Pack 2 x64 Edition126
  • 146. Physical EnvironmentMore processors is betterHost physical RAM (more is better)Minimum 512 GB for primary partition reqt’s +300 MB for Hyper-V reqt’s + Σ (Assigned vRAM/VM + 32 MB +8 MB for each 1 GB RAM over 1GB)Never overload a serverThis relates to both processor utilization and memory.RAM in Hyper-V cannot be shared between VMs. Thus allocated RAM == actual RAM.This is different than VMware behavior.Plan for expansion. Plan for failover. (N+1)127
  • 148. Hyper-V and NetworkingNetworking configuration is important for supportability / flexibilityMore NICsis always better.
  • 149. Hyper-V and NetworkingExternalnetworks connect to the outside world.Internalnetworks operate between VMs and their host only.Private networks connect VMs on the same host
  • 150. Hyper-V and NetworkingConnect to a physical NIC(Optionally) identify internal VLAN identification131
  • 151. Formal Guidance in Securing & Auditing the Virtual Environment, Beyond the Physical…Greg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 152. Four Documents of NoteIn Order of UsefulnessVMware’s VI3.5 Security Hardening GuideHigh-level guidance for security and auditing.The DISA’s STIG for ESX Server & “Virtual Computing”Very specific guidance on security. Required if DoD-connected.“Virtual Computing” STIG is more general, possibly outdated.CIS’s VMware ESX Server 3.0 BenchmarkThis document is aged, but serves as an additional data point for learning / education on common ESX topics.CIS’s Virtual Machine Security GuidelinesThis document, while also aged, is fairly general in its guidance.
  • 153. DISA STIG GuidanceRemember that ESX has roots in RHEL v3, specifically(Kernel 2.6.18-128.ESX).Thus, protecting/auditing ESX starts by protecting/auditing RHEL v3.DISA Requirement ESX0010 states:The IAO/SA will configure the ESX Server in accordance with the UNIX STIG and Checklist. This is not applicable to ESX Server 3i.Any ESX Server must first meet DISA’s general UNIX STIG, then also the ESX STIG.
  • 154. DISA STIG GuidanceOnce met, DISA’s ESX STIG adds nearly 120 individual requirements for modifying / verifying the configuration of that server’s ESX functionality...
  • 155. DISA STIG GuidanceOnce met, DISA’s ESX STIG adds nearly 120 individual requirements for modifying / verifying the configuration of that server’s ESX functionality...Stepping through these items isn’t value added. Let’s instead discuss high-level security and auditing requirements.
  • 156. Guidance for Virtual MachinesSecure virtual machines in the same ways you would physical machines.Updates, A/V, A/M, firewalls.Disable unnecessary functions.OS services, physical devices, screen savers (particularly important).Leverage templates when possibleTemplates ensure that every VM has a common start point, common security/auditing settings.Eases config documentation.
  • 157. Guidance for Virtual MachinesSet Limits/Reservations to prevent resource overuse.Greg’s Advice: Be careful with setting too many limits/reservations.Don’t forget host reserve to protect host functions.Isolate VM networks.Physically separate VM interfaces from VMotion & management connection interfaces to prevent data leakage. Very important.Leverage VLANs if your security policies allow.Use dVSs when possible to reduce configuration error, centralize management of virtual switches.Create isolated management network with high security level.Spec ESX hosts with lots of network cards!
  • 158. Guidance for VMX File CustomizationDisable Remote Copy/Paste Operations between Guest OS and Remote ConsoleCan be used as vector for data leakage. Typically unsecured.isolation.tools.copy.disable = TRUEisolation.tools.paste.disable = TRUEisolation.tools.setGUIoptions.disable = FALSEPrevent Log OverflowVM logs to VI datastore can overflow log space. Set rotation size and count of logs to keep.log.rotatesize = 100000log.keepOld = 10
  • 159. Guidance for VMX File CustomizationDo not permit use of nonpersistent disks.These disks revert back to snapshot when VM is rebooted.Can be used by would-be attacker to cover tracks.Verify in VM settings.Verify that unauthorized devices are not connected.Unnecessary peripherals should not be connected.Prevent user from connecting devices from within the guest OS.floppy<x>.presentserial<x>.presentparallel<x>.presentisolation.tools.connectable.disable = TRUE
  • 160. Guidance for VMX File CustomizationVerify correct assignment of guest OSWhile not necessarily a security risk, improper guest OS assignment will have an impact on system performance.Verify proper permissions on disk files..VMX files should be 755 (o+rwx, g+rx).VMDK files should be 600 (o+rw)User and group should be root.
  • 161. Guidance for ESX Service ConsoleConfigure Service Console with default firewall settings.Add additional settings as necessary for approved services.
  • 162. Suggested Firewall ExclusionsAdd exclusions as necessary. Remember that many “odd” faults are Firewall-based.
  • 163. Guidance for ESX Service ConsoleMinimize use of VI ConsoleConsole access can be substantial impact on VM performance.Remote access protocols slightly better, but…Stop managing infrastructure from any consoles! Use remote tools!Limit use of Service Console for administrationVI Client and VirtualCenter leverage well-defined APIs for management.Service Console leverages Linux-based administration.More opportunity for mistakes with Linux-based administration.If scripting/automation is necessary, leverage Remote CLI, VI Perl Toolkit, or PowerShell Toolkit for scripting rather than shell scripting. Well-defined interfaces.
  • 164. Guidance for ESX Service ConsoleAuthenticate via a Directory ServiceCentralization of authentication via directory service reduces chance of mistake or malicious (hidden) account creation./usr/sbin/esxcfg-auth --enablead --addomain mydomain.com --addc mydc.mydomain.com --krb5realm=mydomain.com --krb5kdc mydc.mydomain.com --krb5adminserver mydc.mydomain.com Control root privilegesDisallow root logins to Service Console. Enforce sudo.cat /dev/null > /etc/securityNote: This may impact iLO and DRAC functionality.Limit sudoto users in wheel group only.auth required /lib/security/$ISA/pam_wheel.so use_uid
  • 165. Guidance for ESX Service ConsoleDisable accounts after three failed loginsCommon requirement in many compliance regs.auth required /lib/security/pam_tally.so no_magic_rootaccount required /lib/security/pam_tally.so deny=3no_magic_rootCreate file for logging failed login attempts.touch /var/log/faillogchownroot:root /var/log/faillogchmod 600 /var/log/faillogAlways remember that ESX Console is not Linux.Don’t manage like Linux. Only install ESX-compatible software.
  • 166. Guidance for Logging / AlertingConfigure NTPAccomplished through VI Console.Enable remote syslog loggingMost compliance regulations require offsite and protected log storage.Configure /etc/syslog.conf.Add the line @<loghost.company.com> after each message type.Kill –SIGHUP `cat /var/run/syslogd.pid`Create and store key file hashes (/etc, /etc/vmware)sha1sum <fileName>This process can be eased through Tripwire / ConfigureSoft
  • 167. Guidance for Logging / AlertingConfigure SNMP. Use SNMP v3 where Possible.Modify /etc/snmp/snmpd.conf(Details of this configuration are out of scope for today’s class)If SNMP v3 not possible, use isolated network for SNMP traffic.
  • 169. Guidance for NetworksMask and Zone FC SAN resources correctly.Ensure that LUNs are only presented to interfaces which need them.Leverage iSCSI AuthenticationiSCSI CHAP authentication is per HBA/NIC, not per-target.No Kerberos available. No encryption available.Ensure that iSCSI traffic is always isolated (security + DoS prevention).Leverage VM-based firewalls for intra-ESX ACLing.ESX’s internal layer 2 firewall terminates network ACLs.External Switch Tagging (EST) VLANs terminate at pSwitchVirtual Switch Tagging (VST) VLANs terminate at vSwitch
  • 172. Guidance for NetworksvSphere + Cisco Nexus overcomes this limitation.
  • 173. Guidance for NetworksReplace self-signed certificatesESX’s native self-signed certificates can be a MitM attack vector.Replace existing certificates with CA-signed certificates.Refer to the VMware document Replacing VirtualCenter Server Certificates for detailed specifications: http://www.vmware.com/pdf/vi_vcserver_certificates.pdf.Disable Promiscuous Mode, MAC Address Changes, Forged Transmissions where possible.Disabling MAC Address Changes can impact some clusters.Promiscuous Mode required for IDS/IPS. Isolate if needed.
  • 174. Guidance for vCenterLimit administrator access. Ensure separation of duties.vCenter includes high-level administrator access, but also discrete task assignment. Ensure that tasks are assigned as needed.Limit database access after installation.vCenter database creation at installation requires DB Owner rights.Database operations only requires Invoke/execute stored procedures, select, update, insert, and delete.Segregate VMware Update Manager and VMware Converter Enterprise roles to isolated computers.This maintains the security position of the vCenter server.
  • 176. Virtualization’s Four HorsemenHypervisor UbiquityThere is a singular hypervisor upon which everything sits.VM DormancyPowered down virtual machines don’t get patched.Virtual NetworkingIntra-ESX network ACLs don’t exist.VM CollocationVMotioning can collocate VMs that should be segregated.
  • 177. Formal Guidance in Securing & Auditing the Virtual Environment, Beyond the Physical…Greg Shields, MVP, vExpertAuthor / Instructor / Speaker / Consultant / All Around Good Guywww.ConcentratedTech.com
  • 178. Please Fill Out Evaluations!Remember:Drop a Business Card orGive Me Your Email Address if you Want these& Other Slides!
  • 179. This slide deck was used in one of our many conference presentations. We hope you enjoy it, and invite you to use it within your own organization however you like.For more information on our company, including information on private classes and upcoming conference appearances, please visit our Web site, www.ConcentratedTech.com. For links to newly-posted decks, follow us on Twitter:@concentrateddon or @concentratdgregThis work is copyright ©Concentrated Technology, LLC

Editor's Notes

  • #21: Source: http://www.virtualization.info/2007/03/44-of-companies-unable-to-declare-their.html
  • #22: http://www.infoworld.com/d/virtualization/virtualization-cost-savings-hard-come-interop-survey-finds-196?source=IFWNLE_nlt_wrapup_2009-05-20