DESKTOP

Windows Server 2008 : Install the Hyper-V Role

10/12/2010 3:47:48 PM
Windows Server 2008 has an installable role, Hyper-V, that enables you to configure an environment to support virtual servers. There are a variety of specific requirements that you need to keep in mind, including the following:
  • The Windows Server Virtualization role can be installed only on a system that has a 64-bit processor.

  • Hardware must support hardware-assisted virtualization (Intel VT or AMD-V) technology and hardware data execution prevention (DEP).

  • Best practice is to have at least two physical network interface cards (NICs): one for management of the server and one or more for the virtual servers.

Note

Why is there a Windows Server 2008 32-bit without Hyper-V edition available if you can only install the role on a 64-bit server? Although you can only install the Hyper-V role on a 64-bit server, you can install the management tools on both 64- and 32-bit machines. The Windows Server 2008 32-bit edition without Hyper-V does not give you the option to install the management tools.


Essentially, Hyper-V installs a hypervisor on top of your hardware but beneath your virtualized systems. This hypervisor makes it appear to all your virtualized systems as though they are running directly on the hardware, not sharing it with other virtualized systems. There is one parent system (running the full version of Windows Server 2008 or the Server Core version) that maintains the structure of Hyper-V.

Note

What is a hypervisor? A hypervisor, also called a virtual machine manager, is a program that runs in a layer between your hardware (processor, memory, disk, network) and your OS. It allows you to install multiple operating systems as long as you have enough hardware power to support them. Different hypervisors work in different ways. For example, the VMware hypervisor includes drivers for your software in the hypervisor itself. The Hyper-V hypervisor does not include those drivers but relies on the OS to hold its own drivers, making the Hyper-V hypervisor “thinner,” or smaller in size.


Install Hyper-V on a Full Installation of Windows Server 2008

To install Hyper-V on a system that is already running the full installation of Windows Server 2008, perform the following steps:

1.
Make sure your hardware is configured for Hyper-V in the BIOS:

  • Security: Execute Disable = On

  • Performance: Virtualization = On

  • Performance: VT for direct I/O access = On

  • Performance: Trusted Execution = Off

Note

Name references in BIOS may differ, depending on the BIOS version. Also, you might need to actually power down your computer, rather than simply restart, for the settings to take hold.

2.
Install the Hyper-V update KB950050 and then reboot.

3.
In Server Manager click Add Roles and select the Hyper-V role.

4.
Note the reminder to configure BIOS settings as well as the links to additional information. Click Next.

5.
On the Create Virtual Networks page, select a network adapter to allow for a virtual network connection for the virtual machines, as shown in Figure 1. You can always add, remove, or modify your virtual networks later, through the Virtual Network Manager.

Figure 1. The Create Virtual Networks page to the Hyper-V installation process.


6.
Review your role settings on the Confirm Installation Selections page and click Install.

7.
When the installation is complete, restart your computer by clicking Yes.

8.
After the computer restarts, you get a message about whether the installation was successful. If all went well, click Close. If you encounter errors, a good place to start your investigation is the event logs.

Now that you have it installed, you can use Server Manager or the Hyper-V Manager (shown in Figure 2) to see all the tools you have at your disposal to create and manage virtual machines.

Figure 2. The Hyper-V Manager, postinstallation.


Install Hyper-V on Server Core

To really improve server utilization and increase security, you might decide to install the Windows Server Virtualization role on the Server Core edition of Windows Server 2008.

To install on the Server Core edition, you follow these steps:

1.
Set the BIOS settings as in the section “Install Hyper-V on a Full Installation of Windows Server 2008.”

2.
Check to see if the edition of Windows Server 2008 supports Hyper-V by entering wmic OS get OperatingSystemSKU. Windows Server 2008 returns a number, and only a few numbers refer to editions that support Hyper-V:

  • 12: Windows Server 2008 Datacenter Edition, Server Core

  • 13: Windows Server 2008 Standard Edition, Server Core

  • 14: Windows Server 2008 Enterprise Edition, Server Core

3.
Ensure that you are running on 64-bit architecture by typing wmic OS get OSArchitecture.

4.
Install the Hyper-V update KB950050 by typing wusa.exe <path to file>Windows6.0-KB950050-x64.msu /quiet. This update reboots the server

5.
Actually install the Windows Server Virtualization Role by entering start /w ocsetup Microsoft-Hyper-V and restart the server when you’re prompted to do so.

Note

Windows Server 2008 Standard edition includes a license for one free virtual instance, Enterprise edition includes a license for four free virtual instances, and Datacenter edition includes a license for an unlimited number of virtual instances.


At this point, you have installed the Windows Server Virtualization role. This is just a platform to build and manage virtual servers. Now let’s look at how to manage this role to build and support virtual servers.

Other  
  •  Windows 7 : Rolling Back to a Stable State with System Restore
  •  Windows 7 : Configuring System Protection Options
  •  Windows 7 : Using the Windows Backup Program
  •  Active Directory Federation Services (ADFS)
  •  Active Directory Rights Management Service (RMS)
  •  Active Directory Lightweight Directory Service (LDS)
  •  Windows Server 2003 : Securing and Troubleshooting Authentication
  •  Windows Server 2003 : Managing User Profiles
  •  Windows Server 2003 : Creating Multiple User Objects
  •  Windows Server 2003 : Creating and Managing User Objects
  •  Understanding Application Domains
  •  Building and Deploying Applications for Windows Azure : Activating the Storage Account Account
  •  Deploying Applications to Windows Azure
  •  Building and Deploying Applications for Windows Azure : Creating a Demo Project
  •  Network Programming with Windows Sockets : Datagrams
  •  Network Programming with Windows Sockets : An Alternative Thread-Safe DLL Strategy
  •  Network Programming with Windows Sockets : A Thread-Safe DLL for Socket Messages
  •  Network Programming with Windows Sockets : In-Process Servers
  •  Network Programming with Windows Sockets : A Socket-Based Server with New Features
  •  Network Programming with Windows Sockets : A Socket-Based Client
  •  
    Video
    Top 10
    Mobile Application Security : BlackBerry Security - Introduction to Platform
    Windows 7 : Protecting Your Computer While Browsing (part 3)
    IIS 7.0 : Securing Configuration - Securing Sensitive Configuration
    AMD A6-3500 - Llano integrated-graphics processors
    Macs no longer safe from virus attacks
    Adobe Photoshop CS5 : Choosing the Right Process Version
    Anatomy of Utrabooks (Part 2) - Acer Aspire S3
    Silverlight Recipes : Updating the UI from a Background Thread
    SQL Server 2008 : Using @@IDENTITY and NEWID Functions in DML Statements
    Sharepoint 2010 : Business Connectivity Services Deployment Types (part 3) - Configure Indexing & Performing a Search
    Most View
    Go Abstract With Camera Dragging (Part 2)
    Mobile Application Security : Mobile Geolocation - Geolocation Methods & Geolocation Implementation
    Vengeance Game Keyboard Of Corsair - Mechanical Masterpieces Give You Control (Part 1)
    Managing Local User Accounts and Groups in Vista
    Windows Phone 7 Development : Building a Phone Client to Access a Cloud Service (part 3) - Coding the BoolToVisibilityConvert
    Windows Azure : Processing with worker roles - Communicating with a worker role
    A Complete Instruction For Your PC Kit And How To Buy (Part 3) - Samsung 300E5A-A01
    Mobile Application Security : SMS Security - Protocol Attacks (part 2)
    Manage iOS with iCloud (Part 2)
    iPhone Application Development : Working with Text, Keyboards, and Buttons (part 4) - Hiding the Keyboard
    Linux - Ninja Pi
    Understanding Mobile Networking and Remote Access in Vista
    Algorithms for Compiler Design: LOOP OPTIMIZATION
    Mastering Windows PC (Part 2) - Use Taskbar, Windows Explorer & Control Panel
    The Android Phone computer (Part 1) - Can I use a USB Keyboard or Mouse?
    Windows 7 : Detecting and Resolving Computer Problems (part 1) - Solving the Tough Problems Automatically
    Biggest tips guide ever! (Part 1)
    Algorithms for Compiler Design: REPRESENTING THREE-ADDRESS STATEMENTS
    Creating Windows with Mixed Content
    Computing Yourself Fit (Part 3)