SlideShare a Scribd company logo
1 of 30
Darshana Jayathilake BCS,VCAP,vExpert VCP, MCSE &
MCT
0094773539096
darshanajayathilake@gmail.com
http://darshanaj.wordpress.com
VMUG Sri Lanka Meetup – June, 2017
Best Practices For VMware
vSphere
ESX host deployment-Best Practices
• Compatible hardware
• Install using custom image(HP, Dell ,Lenovo ,Cisco.etc…).
• Remove ESX installed HD from datastores.
• Install the same & stable version.
ESX host deployment-Best Practices
• Install with minimum 4 nics
ESX host deployment-Best Practices
• Use VMware host profile
ESX host deployment-Best Practices
• Use the latest version of virtual hardware
Feature ESXi 6.0
and
later
ESXi 5.5
and later
ESXi 5.1
and later
ESXi 5.0
and later
ESX/ESXi
4.x and
later
ESX/ESXi
3.5 and
later
Hardware
version
11 10 9 8 7 4
Maximum
memory
(GB)
4080 1011 1011 1011 255 64
Maximum
number of
logical
processors
128 64 64 32 8 4
Maximum
number of
cores
(virtual
CPUs) per
socket
128 64 64 32 8 1
Maximum
video
memory
(MB)
2 GB 512 512 128 128 128
PCI
passthrough
16 6 6 6 6 0
Nested HV
support
Y Y Y N N N
Serial ports 32 4 4 4 4 4
Virtual Machine deployment-Best Practices
• If compatible use paravairtual SCSI adapter.
• Keep VMware tools up to date on guest operating systems.
• Remove any unused virtual hardware device(Floppy disks ,CD/DVC drives ,COM/LPT).
• Only allocate required vCPUs for the VM.
• Select correct guest operating system
Virtual Machine deployment-Best Practices
• Use syspreped vm templates.
• Keep VM/Templates in content library
• Use vApps for multi tier applications
• MS Exchange, SharePoint
• App/DB
• Set the start-up priority
• Use os customization wizard to to apply guest configuration(License key,Time,IP,etc..)
Virtual Machine deployment-Best Practices
Best Practices-vSphere HA cluster
Best Practices-vSphere HA cluster
• Suspend the host monitoring feature, when making network related changes.
• Use redundancy nics for management network with nic teaming.
• Use multiple host isolation addresses.
• If possible create multiple management network connections
• If possible use VMware Distribute switches or use identical port groups.
Best Practices-vSphere HA-DRS
• Enable EVC if you're using different processor types.
• When ever possible use full automated DRS mode.
• Affinity & anti-Affinity rules.
vNetwork-Concept
Types of network switches
VMware Standard Switch(vSS).
Created and managed on a per-host basis.
Support basic features.
Vmware Distributed Switch(vDS).
Created and managed at vSphere vCenter.
Supports all vSS features and more.
Cisco Nexus 1000v.
Created and managed vy vsm(either Vm or hardware/nexus 1010).
Supports features typically available in Cisco hardware switches.
• Separate infrastructure Traffic from VM Traffic
• VMs should not see infrastructure traffic
• Infrastructure traffic bursts do not impact VM
• How to do that
• Separate pNics
• Create multiple vSS/vDS for each pNics
• Requires at least 4 pNics
• Separate VLANs
• Create one vSS/vDS & connect all pNics
• Create portgroups with different VLANs
Best Practices-vSphere Networking
• Teaming & failover
• Always connect 2+ pNics to a vSwitch, preferably linked to separate physical switches
• Select suitable load balancing policy.
• pNic load-Traffic is distributed based on workload(vDS only).
• Port ID/Mac- Traffic is balanced statistically(assumes many vms).
• IP-Hash-Traffic is distributed per connection(requires ether channel).
• Explicit- no load balance.
Best Practices-vSphere Networking
Best Practices-vSphere Networking
• Distribute SwitchesStandard Switches
• Create standard switch with meaning full name using esxcli(ex mgt).
• If possible try to use VMware Distributed Switches.
Snapshot
• VMware snapshot is a copy of the virtual machine’s disk file at a given point
in time.
• Snapshot capture the state of all the virtual machine disks, memory and
virtual machine settings.
Snapshot-Best Practices
• Snapshot is not a backup.
• Create a meaning full name with snapshot.
• Do not use single snapshot for more than 24-72 hours.
• When using a third-party backup software, ensure that snapshots are deleted
after a successful backup.
• Remove any snapshot before doing any changes in a virtual mode rdm
• Configure alerts on snapshot(eg: more than 1GB)
Best Practices-ESX Security
• Disable ssh access for root & create additional admin account.
Best Practices-ESX Security
• Configure password policy
• Character classes
• Upper Case
• Lower Case
• Numbers
• Special ($%#@#…..)
• Default password policy
retry=3 min=disabled,disabled,disabled,7,7
Best Practices-ESX Security
• Configure lockdown mode.
Best Practices-vCenter Security
• Limited RDP access(windows based vCenter).
• Integrate with AD.
• SSO administrator account.
• Use different sso domain other than vSphere.local.
• Granular level permission structure.
• Task & event retention period-90 Days
vCenter Deployment
vCenter Deployment
• Use external databse(oracle & SQL).
• Maintain database backups of the vCenerDB.
vCenter Deployment
• If possible use separate management host/cluster.
• Should use low latency network connection with external database.
• Install vCenter appliance.
• Use proper name resolution method.
• Use external PSC for large environment.
vCenter Deployment
Best practices-Backup
• Integrate with vCenter.
• Configure SAN based backup.
• D2D2T Backups.
• Test your backup regularly.
• Full & differential backups.
VMware Technical Support-Best Practices
• Keep customer no and required details with safe place.
• Upload/Provide diagram/s of the configuration(storage,cluster,host,network,,etc..).
• Install & configure VMware support assistant.
• Pre configured firewall/access rules for remote access software(webex).
vShpere Housekeeping
• Generate reports & check for warnings/errors ( Ops Manager ,rvtools).
• If you rename a virtual machine, trigger storage vMotion.
• Storage clean-up.
• Maintain change management.
• Remove & maintain snapshots(powercli).
• Update VM templates-Monthly.
• Maintain VM annotion & tags.
Thank you.

More Related Content

Similar to vmwaresbasics users level best practices

OSCON2014: Understanding Hypervisor Selection in Apache CloudStack
OSCON2014: Understanding Hypervisor Selection in Apache CloudStackOSCON2014: Understanding Hypervisor Selection in Apache CloudStack
OSCON2014: Understanding Hypervisor Selection in Apache CloudStackTim Mackey
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015VMUG IT
 
What is coming for VMware vSphere?
What is coming for VMware vSphere?What is coming for VMware vSphere?
What is coming for VMware vSphere?Duncan Epping
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationsolarisyougood
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationsolarisyougood
 
VMworld - vSphere Distributed Switch 6.0 Technical Deep Dive
VMworld - vSphere Distributed Switch 6.0 Technical Deep DiveVMworld - vSphere Distributed Switch 6.0 Technical Deep Dive
VMworld - vSphere Distributed Switch 6.0 Technical Deep DiveChris Wahl
 
Esx short presentation
Esx short presentationEsx short presentation
Esx short presentationxKinAnx
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5Vepsun Technologies
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5Sanjeev Kumar
 
Hypervisor selection in CloudStack
Hypervisor selection in CloudStackHypervisor selection in CloudStack
Hypervisor selection in CloudStackTim Mackey
 
Auto Deploy Deep Dive – vBrownBag Style
Auto Deploy Deep Dive – vBrownBag StyleAuto Deploy Deep Dive – vBrownBag Style
Auto Deploy Deep Dive – vBrownBag StyleRobert Nelson
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to VirtualizationMuhammadRizkyFaza
 
VMWare VSphere4 Documentation Notes
VMWare VSphere4 Documentation NotesVMWare VSphere4 Documentation Notes
VMWare VSphere4 Documentation NotesGrit Suwa
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Spiceworks
 
Virtualization
VirtualizationVirtualization
VirtualizationBirju Tank
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwaresolarisyougood
 

Similar to vmwaresbasics users level best practices (20)

OSCON2014: Understanding Hypervisor Selection in Apache CloudStack
OSCON2014: Understanding Hypervisor Selection in Apache CloudStackOSCON2014: Understanding Hypervisor Selection in Apache CloudStack
OSCON2014: Understanding Hypervisor Selection in Apache CloudStack
 
Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015Presentazione VMware @ VMUGIT UserCon 2015
Presentazione VMware @ VMUGIT UserCon 2015
 
Cloudstack选型
Cloudstack选型Cloudstack选型
Cloudstack选型
 
What is coming for VMware vSphere?
What is coming for VMware vSphere?What is coming for VMware vSphere?
What is coming for VMware vSphere?
 
Rht upgrade v5-v2
Rht upgrade v5-v2Rht upgrade v5-v2
Rht upgrade v5-v2
 
Hyper-v Best Practices
Hyper-v Best PracticesHyper-v Best Practices
Hyper-v Best Practices
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
VMworld - vSphere Distributed Switch 6.0 Technical Deep Dive
VMworld - vSphere Distributed Switch 6.0 Technical Deep DiveVMworld - vSphere Distributed Switch 6.0 Technical Deep Dive
VMworld - vSphere Distributed Switch 6.0 Technical Deep Dive
 
Esx short presentation
Esx short presentationEsx short presentation
Esx short presentation
 
VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5VMware Advance Troubleshooting Workshop - Day 5
VMware Advance Troubleshooting Workshop - Day 5
 
VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5VMware vSphere 6.0 - Troubleshooting Training - Day 5
VMware vSphere 6.0 - Troubleshooting Training - Day 5
 
Hypervisor selection in CloudStack
Hypervisor selection in CloudStackHypervisor selection in CloudStack
Hypervisor selection in CloudStack
 
Auto Deploy Deep Dive – vBrownBag Style
Auto Deploy Deep Dive – vBrownBag StyleAuto Deploy Deep Dive – vBrownBag Style
Auto Deploy Deep Dive – vBrownBag Style
 
Introduction to Virtualization
Introduction to VirtualizationIntroduction to Virtualization
Introduction to Virtualization
 
VMWare VSphere4 Documentation Notes
VMWare VSphere4 Documentation NotesVMWare VSphere4 Documentation Notes
VMWare VSphere4 Documentation Notes
 
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep DiveVMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
VMworld 2015: vSphere Distributed Switch 6 –Technical Deep Dive
 
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
Making IT Easier to Manage Your Virtualized Environment - David Babbitt, Spic...
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mwareBenchmark   emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
Benchmark emc vnx7500, emc fast suite, emc snap sure and oracle rac on v-mware
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Recently uploaded (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

vmwaresbasics users level best practices

  • 1. Darshana Jayathilake BCS,VCAP,vExpert VCP, MCSE & MCT 0094773539096 darshanajayathilake@gmail.com http://darshanaj.wordpress.com VMUG Sri Lanka Meetup – June, 2017 Best Practices For VMware vSphere
  • 2. ESX host deployment-Best Practices • Compatible hardware
  • 3. • Install using custom image(HP, Dell ,Lenovo ,Cisco.etc…). • Remove ESX installed HD from datastores. • Install the same & stable version. ESX host deployment-Best Practices
  • 4. • Install with minimum 4 nics ESX host deployment-Best Practices
  • 5. • Use VMware host profile ESX host deployment-Best Practices
  • 6. • Use the latest version of virtual hardware Feature ESXi 6.0 and later ESXi 5.5 and later ESXi 5.1 and later ESXi 5.0 and later ESX/ESXi 4.x and later ESX/ESXi 3.5 and later Hardware version 11 10 9 8 7 4 Maximum memory (GB) 4080 1011 1011 1011 255 64 Maximum number of logical processors 128 64 64 32 8 4 Maximum number of cores (virtual CPUs) per socket 128 64 64 32 8 1 Maximum video memory (MB) 2 GB 512 512 128 128 128 PCI passthrough 16 6 6 6 6 0 Nested HV support Y Y Y N N N Serial ports 32 4 4 4 4 4 Virtual Machine deployment-Best Practices
  • 7. • If compatible use paravairtual SCSI adapter. • Keep VMware tools up to date on guest operating systems. • Remove any unused virtual hardware device(Floppy disks ,CD/DVC drives ,COM/LPT). • Only allocate required vCPUs for the VM. • Select correct guest operating system Virtual Machine deployment-Best Practices
  • 8. • Use syspreped vm templates. • Keep VM/Templates in content library • Use vApps for multi tier applications • MS Exchange, SharePoint • App/DB • Set the start-up priority • Use os customization wizard to to apply guest configuration(License key,Time,IP,etc..) Virtual Machine deployment-Best Practices
  • 10. Best Practices-vSphere HA cluster • Suspend the host monitoring feature, when making network related changes. • Use redundancy nics for management network with nic teaming. • Use multiple host isolation addresses. • If possible create multiple management network connections • If possible use VMware Distribute switches or use identical port groups.
  • 11. Best Practices-vSphere HA-DRS • Enable EVC if you're using different processor types. • When ever possible use full automated DRS mode. • Affinity & anti-Affinity rules.
  • 13. Types of network switches VMware Standard Switch(vSS). Created and managed on a per-host basis. Support basic features. Vmware Distributed Switch(vDS). Created and managed at vSphere vCenter. Supports all vSS features and more. Cisco Nexus 1000v. Created and managed vy vsm(either Vm or hardware/nexus 1010). Supports features typically available in Cisco hardware switches.
  • 14. • Separate infrastructure Traffic from VM Traffic • VMs should not see infrastructure traffic • Infrastructure traffic bursts do not impact VM • How to do that • Separate pNics • Create multiple vSS/vDS for each pNics • Requires at least 4 pNics • Separate VLANs • Create one vSS/vDS & connect all pNics • Create portgroups with different VLANs Best Practices-vSphere Networking
  • 15. • Teaming & failover • Always connect 2+ pNics to a vSwitch, preferably linked to separate physical switches • Select suitable load balancing policy. • pNic load-Traffic is distributed based on workload(vDS only). • Port ID/Mac- Traffic is balanced statistically(assumes many vms). • IP-Hash-Traffic is distributed per connection(requires ether channel). • Explicit- no load balance. Best Practices-vSphere Networking
  • 16. Best Practices-vSphere Networking • Distribute SwitchesStandard Switches • Create standard switch with meaning full name using esxcli(ex mgt). • If possible try to use VMware Distributed Switches.
  • 17. Snapshot • VMware snapshot is a copy of the virtual machine’s disk file at a given point in time. • Snapshot capture the state of all the virtual machine disks, memory and virtual machine settings.
  • 18. Snapshot-Best Practices • Snapshot is not a backup. • Create a meaning full name with snapshot. • Do not use single snapshot for more than 24-72 hours. • When using a third-party backup software, ensure that snapshots are deleted after a successful backup. • Remove any snapshot before doing any changes in a virtual mode rdm • Configure alerts on snapshot(eg: more than 1GB)
  • 19. Best Practices-ESX Security • Disable ssh access for root & create additional admin account.
  • 20. Best Practices-ESX Security • Configure password policy • Character classes • Upper Case • Lower Case • Numbers • Special ($%#@#…..) • Default password policy retry=3 min=disabled,disabled,disabled,7,7
  • 21. Best Practices-ESX Security • Configure lockdown mode.
  • 22. Best Practices-vCenter Security • Limited RDP access(windows based vCenter). • Integrate with AD. • SSO administrator account. • Use different sso domain other than vSphere.local. • Granular level permission structure. • Task & event retention period-90 Days
  • 25. • Use external databse(oracle & SQL). • Maintain database backups of the vCenerDB. vCenter Deployment
  • 26. • If possible use separate management host/cluster. • Should use low latency network connection with external database. • Install vCenter appliance. • Use proper name resolution method. • Use external PSC for large environment. vCenter Deployment
  • 27. Best practices-Backup • Integrate with vCenter. • Configure SAN based backup. • D2D2T Backups. • Test your backup regularly. • Full & differential backups.
  • 28. VMware Technical Support-Best Practices • Keep customer no and required details with safe place. • Upload/Provide diagram/s of the configuration(storage,cluster,host,network,,etc..). • Install & configure VMware support assistant. • Pre configured firewall/access rules for remote access software(webex).
  • 29. vShpere Housekeeping • Generate reports & check for warnings/errors ( Ops Manager ,rvtools). • If you rename a virtual machine, trigger storage vMotion. • Storage clean-up. • Maintain change management. • Remove & maintain snapshots(powercli). • Update VM templates-Monthly. • Maintain VM annotion & tags.

Editor's Notes

  1. The latest version of Virtual Hardware provides performance enhancements and maximums over older Virtual Hardware versions. Paravirtualized hardware provides advanced queuing and processing off-loading features to maximize Virtual Machine performance. Additionally, paravirtualized drives provide batching of interrupts and requests to the physical hardware, which provides optimal performance for resource intensive operations. VMware Tools provides guest OS drivers for paravirtual devices that optimize the interaction with VMkernel and offload potentially processor-intensive tasks such packet segmentation. Each virtual hardware device assigned to a VM requires interrupts on the physical CPU; reducing the number of unnecessary interrupts reduces the overhead associated with a VM
  2. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  3. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  4. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  5. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  6. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  7. vCenter Server uses admission control to ensure that sufficient resources are available in a cluster to provide failover protection and to ensure that virtual machine resource reservations are respected. Try to keep virtual machine sizing requirements similar across all configured virtual machines. The Host Failures Cluster Tolerates admission control policy uses slot sizes to calculate the amount of capacity needed to reserve for each virtual machine. The slot size is based on the largest reserved memory and CPU needed for any virtual machine. When you mix virtual machines of different CPU and memory requirements, the slot size calculation defaults to the largest possible, which limits consolidation. In most implementations, NIC teaming provides sufficient heartbeat redundancy, but as an alternative you can create a second management network connection attached to a separate virtual switch. Redundant management networking allows the reliable detection of failures and prevents isolation or partition conditions from occurring, because heartbeats can be sent over multiple networks. The original management network connection is used for network and management purposes. When the second management network connection is created, vSphere HA sends heartbeats over both management network connections. If one path fails, vSphere HA still sends and receives heartbeats over the other path.
  8. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  9. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  10. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  11. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  12. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  13. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).
  14. Keep the vSphere vMotion connection on a separate network. When migration with vMotion occurs, the contents of the guest operating system’s memory is transmitted over the network. You can do this either by using VLANs to segment a single physical network or by using separate physical networks (the latter is preferable).