Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Hyper-V Cluster Design

You're reading from   Microsoft Hyper-V Cluster Design To achieve a Windows Server system that virtually takes care of itself, you need to master Hyper-V cluster design. This book is the perfect tutorial on the subject, providing clear instruction on expanding into the virtualized environment.

Arrow left icon
Product type Paperback
Published in Oct 2013
Publisher
ISBN-13 9781782177685
Length 462 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Eric Siron Eric Siron
Author Profile Icon Eric Siron
Eric Siron
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Hyper-V Cluster Orientation FREE CHAPTER 2. Cluster Design and Planning 3. Constructing a Hyper-V Server Cluster 4. Storage Design 5. Network Design 6. Network Traffic Shaping and Performance Enhancements 7. Memory Planning and Management 8. Performance Testing and Load Balancing 9. Special Cases 10. Maintaining and Monitoring a Hyper-V Server Cluster 11. High Availability 12. Backup and Disaster Recovery Index

Monitoring Hyper-V Server

The built-in tools for monitoring Windows Server and Hyper-V Server are not well-suited to providing automated and proactive monitoring capabilities. Microsoft provides a comprehensive package of management and notification tools in the System Center 2012 with Service Pack 1 product suite. Many third-party solutions also exist, and a few of them are free or ad-supported. Many hardware providers also include software that can alert you to any issues with their equipment.

There is no single list to help you determine exactly what you'll need in a monitoring system, but there are some guidelines:

  • Integrated solutions are preferred, but you may need to mix and match components from different providers to get the monitoring solution you need.
  • Ensure that the system has a reliable way to notify you of problems. E-mail and SMS are common, but they are of minimal use if they require that a monitored system be accessible. For example, a local monitoring system that sends...
lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime